Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qww5-p626-rfpf

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.4

Описание

Jenkins JX Resources Plugin cross-site request forgery vulnerability

Jenkins jx-resources Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified Kubernetes server and obtain information about an attacker-specified namespace. Doing so might also leak service account credentials used for the connection. Additionally, it allowed attackers to obtain the value of any attacker-specified environment variable for the Jenkins controller process.

Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.

This form validation method now requires POST requests and Overall/Administer permissions.

Пакеты

Наименование

org.jenkins-ci.plugins:jx-resources

maven
Затронутые версииВерсия исправления

<= 1.0.36

1.0.37

EPSS

Процентиль: 27%
0.00097
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.8
nvd
больше 6 лет назад

A cross-site request forgery vulnerability in Jenkins JX Resources Plugin 1.0.36 and earlier in GlobalPluginConfiguration#doValidateClient allowed attackers to have Jenkins connect to an attacker-specified Kubernetes server, potentially leaking credentials.

EPSS

Процентиль: 27%
0.00097
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-352