Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rf5q-8gx3-xqfc

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Cross-Site Request Forgery in Jenkins Git Plugin

Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.

Пакеты

Наименование

org.jenkins-ci.plugins:git

maven
Затронутые версииВерсия исправления

< 3.2.2

3.3.2

EPSS

Процентиль: 35%
0.00147
Низкий

7.5 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 3.1
redhat
больше 8 лет назад

Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.

CVSS3: 7.5
nvd
больше 8 лет назад

Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.

EPSS

Процентиль: 35%
0.00147
Низкий

7.5 High

CVSS3

Дефекты

CWE-352