First published: Mon Dec 19 2022(Updated: )
Concourse (7.x.y prior to 7.8.3 and 6.x.y prior to 6.7.9) contains an authorization bypass issue. A Concourse user can send a request with body including :team_name=team2 to bypass team scope check to gain access to certain resources belong to any other team.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Concourse | >=6.0.0<6.7.9 | |
Pivotal Software Concourse | >=7.0.0<7.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31683 is a vulnerability in Concourse versions 7.x.y prior to 7.8.3 and 6.x.y prior to 6.7.9 that allows an authorization bypass, allowing a user to gain access to certain resources belonging to other teams.
CVE-2022-31683 has a severity rating of 5.4, which is considered medium.
To fix CVE-2022-31683, you should upgrade to Concourse version 7.8.3 or 6.7.9, depending on your current version.
The affected software of CVE-2022-31683 is Concourse versions 7.x.y prior to 7.8.3 and 6.x.y prior to 6.7.9, specifically the Pivotal Software Concourse.
You can find more information about CVE-2022-31683 in the GitHub security advisory: https://github.com/concourse/concourse/security/advisories/GHSA-5jp2-vwrj-99rf