Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000085

Опубликовано: 10 июл. 2017
Источник: redhat
CVSS3: 3.1
EPSS Низкий

Описание

Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.

Subversion Plugin improperly checked permissions, requiring just Item/Build instead of Item/Configure when used. This allows a user to specify an attacker-controlled Subversion server which can then be used to collect credentials used by the Subversion plugin.

Отчет

This issue affects the versions of jenkins-plugin-subversion as shipped with Red Hat OpenShift Enterprise 3. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 3jenkins-plugin-subversionWill not fix
Red Hat OpenShift Container Platform 3.6atomic-openshiftFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6fluentdFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6jenkins-2-pluginsFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6kibanaFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-cool.ioFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-exconFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-faradayFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-fluent-plugin-kubernetes_metadata_filterFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-fluent-plugin-viaq_data_modelFixedRHBA-2017:264208.09.2017

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=1471046jenkins-plugin-subversion: CSRF vulnerability and insufficient permission checks allow capturing credentials (SECURITY-303)

EPSS

Процентиль: 34%
0.00141
Низкий

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 8 лет назад

Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.

CVSS3: 6.5
github
больше 3 лет назад

Jenkins Subversion Plugin Cross-Site Request Forgery vulnerability

EPSS

Процентиль: 34%
0.00141
Низкий

3.1 Low

CVSS3