Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fv3c-6cw7-2qcq

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Jenkins Poll SCM Plugin vulnerable to Cross-Site Request Forgery

Jenkins Poll SCM Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to initiate polling of projects with a known name. While Jenkins in general does not consider polling to be a protection-worthy action as it's similar to cache invalidation, the plugin specifically adds a permission to be able to use this functionality, and this issue undermines that permission. This functionality now is only available via POST.

Пакеты

Наименование

org.jenkins-ci.plugins:pollscm

maven
Затронутые версииВерсия исправления

< 1.3.1

1.3.1

EPSS

Процентиль: 20%
0.00062
Низкий

8.8 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.8
nvd
больше 8 лет назад

Poll SCM Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to initiate polling of projects with a known name. While Jenkins in general does not consider polling to be a protection-worthy action as it's similar to cache invalidation, the plugin specifically adds a permission to be able to use this functionality, and this issue undermines that permission.

EPSS

Процентиль: 20%
0.00062
Низкий

8.8 High

CVSS3

Дефекты

CWE-352