Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j365-62px-vjjv

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8

Описание

Jenkins GitLab Plugin Cross-Site Request Forgery vulnerability

Jenkins GitLab Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.

This form validation method now requires POST requests and Overall/Administer permissions.

Пакеты

Наименование

org.jenkins-ci.plugins:gitlab-plugin

maven
Затронутые версииВерсия исправления

<= 1.5.11

1.5.12

EPSS

Процентиль: 26%
0.00089
Низкий

8 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8
nvd
около 6 лет назад

A cross-site request forgery vulnerability in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

EPSS

Процентиль: 26%
0.00089
Низкий

8 High

CVSS3

Дефекты

CWE-352