Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vrvm-459q-j824

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.2

Описание

Jenkins Ansible Tower Plugin cross-site request forgery vulnerability

Jenkins Ansible Tower Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.

This form validation method now requires POST requests and Overall/Administer permissions.

Пакеты

Наименование

org.jenkins-ci.plugins:ansible-tower

maven
Затронутые версииВерсия исправления

<= 0.9.1

0.9.2

EPSS

Процентиль: 36%
0.00149
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.8
redhat
почти 7 лет назад

A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins

CVSS3: 8.8
nvd
почти 7 лет назад

A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins

EPSS

Процентиль: 36%
0.00149
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-352