Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rgmj-mccj-h9mx

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Cross-Site Request Forgery in Jenkins

A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

<= 2.107.2

2.107.3

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.108, <= 2.120

2.121

EPSS

Процентиль: 71%
0.00695
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 3.5
redhat
больше 7 лет назад

A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.

CVSS3: 4.3
nvd
больше 7 лет назад

A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.

CVSS3: 4.3
debian
больше 7 лет назад

A server-side request forgery vulnerability exists in Jenkins 2.120 an ...

EPSS

Процентиль: 71%
0.00695
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-352