Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3v9f-4vff-rx42

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Jenkins Static Analysis Utilities Plugin is vulnerable to Cross-site request forgery vulnerability

Jenkins analysis-core Plugin has the capability to allow other plugins to display trend graphs for their static analysis results. analysis-core Plugin provides the configuration form for the default settings of each graph.

The configuration form and form submission handler did not perform a permission check, allowing attackers with Job/Read access to change the per-job graph configuration defaults for all users.

Additionally, the form submission handler did not require POST requests, resulting in a cross-site request forgery vulnerability.

analysis-core Plugin now requires Job/Configure permission and POST requests to configure the per-job graph defaults for all users.

Пакеты

Наименование

org.jvnet.hudson.plugins:analysis-core

maven
Затронутые версииВерсия исправления

<= 1.95

1.96

EPSS

Процентиль: 41%
0.00194
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 6.5
nvd
почти 7 лет назад

A cross-site request forgery vulnerability in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers to change the per-job default graph configuration for all users.

EPSS

Процентиль: 41%
0.00194
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-352