Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-58rq-69jp-xc23

Опубликовано: 20 сент. 2023
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Jenkins Build Failure Analyzer Plugin Cross-Site Request Forgery vulnerability

Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not perform a permission check in a connection test HTTP endpoint.

This allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.

Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Build Failure Analyzer Plugin 2.4.2 requires POST requests and Overall/Administer permission for the affected HTTP endpoint.

Пакеты

Наименование

com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer

maven
Затронутые версииВерсия исправления

< 2.4.2

2.4.2

EPSS

Процентиль: 20%
0.00063
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.8
nvd
больше 2 лет назад

A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.

EPSS

Процентиль: 20%
0.00063
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-352