Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r5w3-pfq8-3r82

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Jenkins SAML Plugin allows bypassing CSRF protection for any URL

An extension point in Jenkins allows selectively disabling cross-site request forgery (CSRF) protection for specific URLs. SAML Plugin implements this extension point for the URL that users are redirected to after login.

In Jenkins SAML Plugin 2.0.7 and earlier this implementation is too permissive, allowing attackers to craft URLs that would bypass the CSRF protection of any target URL.\n\nThis vulnerability was originally introduced in Jenkins SAML Plugin 1.1.3.

Jenkins SAML Plugin 2.0.8 restricts which URLs it disables cross-site request forgery (CSRF) protection for to the one URL that needs it.

Пакеты

Наименование

org.jenkins-ci.plugins:saml

maven
Затронутые версииВерсия исправления

<= 2.0.7

2.0.8

EPSS

Процентиль: 20%
0.00065
Низкий

8.8 High

CVSS3

Дефекты

CWE-352
CWE-693

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

Jenkins SAML Plugin 2.0.7 and earlier allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.

EPSS

Процентиль: 20%
0.00065
Низкий

8.8 High

CVSS3

Дефекты

CWE-352
CWE-693