Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c2hg-2jj6-h8vh

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.1

Описание

CSRF vulnerability in Jenkins Pipeline Maven Integration Plugin allow capturing credentials

Pipeline Maven Integration Plugin 3.8.2 and earlier does not perform a permission check in a method implementing form validation.

This allows users with Overall/Read access to Jenkins to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.

Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Pipeline Maven Integration Plugin 3.8.3 requires POST requests and Job/Configure permission for the affected form validation method.

Пакеты

Наименование

org.jenkins-ci.plugins:pipeline-maven

maven
Затронутые версииВерсия исправления

< 3.8.3

3.8.3

EPSS

Процентиль: 61%
0.0041
Низкий

7.1 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 6.5
nvd
больше 5 лет назад

A cross-site request forgery (CSRF) vulnerability in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows attackers to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.

EPSS

Процентиль: 61%
0.0041
Низкий

7.1 High

CVSS3

Дефекты

CWE-352