Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qxh5-5r5p-5gvf

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Cross-Site Request Forgery in Jenkins Blue Ocean Plugin

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API. The vulnerability is found in:

  • blueocean-core-js/src/js/bundleStartup.js
  • blueocean-core-js/src/js/fetch.ts
  • blueocean-core-js/src/js/i18n/i18n.js
  • blueocean-core-js/src/js/urlconfig.js
  • blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java
  • blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java
  • blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly

Пакеты

Наименование

io.jenkins.blueocean:blueocean

maven
Затронутые версииВерсия исправления

< 1.10.2

1.10.2

EPSS

Процентиль: 36%
0.00154
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 7.3
redhat
около 7 лет назад

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API.

CVSS3: 6.5
nvd
около 7 лет назад

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API.

EPSS

Процентиль: 36%
0.00154
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-352