Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000092

Опубликовано: 10 июл. 2017
Источник: redhat
CVSS3: 3.1

Описание

Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.

The Git Plugin can leak credentials (username and password) used to access a git repo if an attacker-supplied URL is provided to the plugin. To supply the URL to the plugin, the attacker would need to guess a username/password ID and then trick a developer into following a specific URL.

Отчет

This issue affects the versions of jenkins-plugin-git as shipped with Red Hat OpenShift Enterprise 3. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 3jenkins-plugin-gitWill not fix
Red Hat OpenShift Container Platform 3.6atomic-openshiftFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6fluentdFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6jenkins-2-pluginsFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6kibanaFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-cool.ioFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-exconFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-faradayFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-fluent-plugin-kubernetes_metadata_filterFixedRHBA-2017:264208.09.2017
Red Hat OpenShift Container Platform 3.6rubygem-fluent-plugin-viaq_data_modelFixedRHBA-2017:264208.09.2017

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=1471053jenkins-plugin-git: CSRF vulnerability allows capturing credentials (SECURITY-528)

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 8 лет назад

Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.

CVSS3: 7.5
github
больше 3 лет назад

Cross-Site Request Forgery in Jenkins Git Plugin

3.1 Low

CVSS3