CVE-2022-36088: CWE-284: Improper Access Control in gocd gocd
GoCD is a continuous delivery server. Windows installations via either the server or agent installers for GoCD prior to 22.2.0 do not adequately restrict permissions when installing outside of the default location. This could allow a malicious user with local access to the server GoCD Server or Agent are installed on to modify executables or components of the installation. This does not affect zip file-based installs, installations to other platforms, or installations inside `Program Files` or `Program Files (x86)`. This issue is fixed in GoCD 22.2.0 installers. As a workaround, if the server or agent is installed outside of `Program Files (x86)`, verify the the permission of the Server or Agent installation directory to ensure the `Everyone` user group does not have `Full Control`, `Modify` or `Write` permissions.
AI Analysis
Technical Summary
CVE-2022-36088 is a medium-severity vulnerability affecting GoCD, a continuous delivery server widely used for automating software deployment pipelines. The issue arises specifically in Windows installations of GoCD server or agent versions prior to 22.2.0 when installed outside the default directories ("Program Files" or "Program Files (x86)"). In these cases, the installation process does not properly restrict file system permissions on the installation directory. This improper access control (CWE-284) and improper privilege management (CWE-269) allow any local user with access to the server or agent machine to modify executables or other components within the GoCD installation directory. Such modifications could lead to privilege escalation, code execution, or tampering with the continuous delivery pipeline, potentially compromising the integrity and availability of the software delivery process. Notably, this vulnerability does not affect zip file-based installations or installations on non-Windows platforms. The vendor fixed the issue in GoCD version 22.2.0 by correcting the installer permissions. A recommended workaround for affected systems is to verify and restrict NTFS permissions on the installation directory to ensure that the "Everyone" group does not have "Full Control", "Modify", or "Write" permissions, thereby preventing unauthorized local modifications. There are no known exploits in the wild reported for this vulnerability as of the published date (September 7, 2022).
Potential Impact
For European organizations, the impact of CVE-2022-36088 primarily concerns the integrity and availability of continuous delivery pipelines managed by GoCD on Windows servers or agents installed outside default directories. An attacker with local access—such as an insider threat, compromised user account, or lateral movement from another compromised system—could alter GoCD executables or components, potentially injecting malicious code or disrupting deployment workflows. This could lead to unauthorized code execution, deployment of malicious software, or denial of service in critical software delivery environments. Given that GoCD is used in software development and operations, such tampering can undermine software supply chain security, which is a high priority in Europe due to regulatory frameworks like the EU Cybersecurity Act and NIS Directive. While the vulnerability requires local access and is mitigated by default installation paths, organizations with custom installation practices or lax local access controls are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially in environments with privileged users or insufficient endpoint security controls.
Mitigation Recommendations
1. Upgrade all GoCD Windows server and agent installations to version 22.2.0 or later, where the installer properly restricts permissions. 2. For existing installations outside the default directories, immediately audit NTFS permissions on the GoCD installation folder. Remove "Full Control", "Modify", or "Write" permissions from the "Everyone" group or any non-administrative users. 3. Enforce the use of default installation directories ("Program Files" or "Program Files (x86)") for GoCD installations to leverage default Windows permission protections. 4. Implement strict local user access controls and endpoint security measures to prevent unauthorized local access to build servers and agents. 5. Monitor file integrity of GoCD executables and components using file integrity monitoring tools to detect unauthorized changes. 6. Incorporate GoCD server and agent hosts into centralized logging and alerting systems to detect suspicious local activity. 7. Educate system administrators and DevOps teams on secure installation practices and the risks of improper permissions on critical infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Ireland, Poland
CVE-2022-36088: CWE-284: Improper Access Control in gocd gocd
Description
GoCD is a continuous delivery server. Windows installations via either the server or agent installers for GoCD prior to 22.2.0 do not adequately restrict permissions when installing outside of the default location. This could allow a malicious user with local access to the server GoCD Server or Agent are installed on to modify executables or components of the installation. This does not affect zip file-based installs, installations to other platforms, or installations inside `Program Files` or `Program Files (x86)`. This issue is fixed in GoCD 22.2.0 installers. As a workaround, if the server or agent is installed outside of `Program Files (x86)`, verify the the permission of the Server or Agent installation directory to ensure the `Everyone` user group does not have `Full Control`, `Modify` or `Write` permissions.
AI-Powered Analysis
Technical Analysis
CVE-2022-36088 is a medium-severity vulnerability affecting GoCD, a continuous delivery server widely used for automating software deployment pipelines. The issue arises specifically in Windows installations of GoCD server or agent versions prior to 22.2.0 when installed outside the default directories ("Program Files" or "Program Files (x86)"). In these cases, the installation process does not properly restrict file system permissions on the installation directory. This improper access control (CWE-284) and improper privilege management (CWE-269) allow any local user with access to the server or agent machine to modify executables or other components within the GoCD installation directory. Such modifications could lead to privilege escalation, code execution, or tampering with the continuous delivery pipeline, potentially compromising the integrity and availability of the software delivery process. Notably, this vulnerability does not affect zip file-based installations or installations on non-Windows platforms. The vendor fixed the issue in GoCD version 22.2.0 by correcting the installer permissions. A recommended workaround for affected systems is to verify and restrict NTFS permissions on the installation directory to ensure that the "Everyone" group does not have "Full Control", "Modify", or "Write" permissions, thereby preventing unauthorized local modifications. There are no known exploits in the wild reported for this vulnerability as of the published date (September 7, 2022).
Potential Impact
For European organizations, the impact of CVE-2022-36088 primarily concerns the integrity and availability of continuous delivery pipelines managed by GoCD on Windows servers or agents installed outside default directories. An attacker with local access—such as an insider threat, compromised user account, or lateral movement from another compromised system—could alter GoCD executables or components, potentially injecting malicious code or disrupting deployment workflows. This could lead to unauthorized code execution, deployment of malicious software, or denial of service in critical software delivery environments. Given that GoCD is used in software development and operations, such tampering can undermine software supply chain security, which is a high priority in Europe due to regulatory frameworks like the EU Cybersecurity Act and NIS Directive. While the vulnerability requires local access and is mitigated by default installation paths, organizations with custom installation practices or lax local access controls are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially in environments with privileged users or insufficient endpoint security controls.
Mitigation Recommendations
1. Upgrade all GoCD Windows server and agent installations to version 22.2.0 or later, where the installer properly restricts permissions. 2. For existing installations outside the default directories, immediately audit NTFS permissions on the GoCD installation folder. Remove "Full Control", "Modify", or "Write" permissions from the "Everyone" group or any non-administrative users. 3. Enforce the use of default installation directories ("Program Files" or "Program Files (x86)") for GoCD installations to leverage default Windows permission protections. 4. Implement strict local user access controls and endpoint security measures to prevent unauthorized local access to build servers and agents. 5. Monitor file integrity of GoCD executables and components using file integrity monitoring tools to detect unauthorized changes. 6. Incorporate GoCD server and agent hosts into centralized logging and alerting systems to detect suspicious local activity. 7. Educate system administrators and DevOps teams on secure installation practices and the risks of improper permissions on critical infrastructure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3dc6
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 10:07:03 PM
Last updated: 8/18/2025, 11:33:34 PM
Views: 14
Related Threats
CVE-2025-51529: n/a
MediumCVE-2025-50579: n/a
MediumCVE-2025-55740: CWE-1392: Use of Default Credentials in Anipaleja nginx-defender
MediumCVE-2025-51543: n/a
UnknownCVE-2025-50926: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.