Логотип exploitDog
bind:CVE-2017-1000091
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-1000091

Количество 2

Количество 2

nvd логотип

CVE-2017-1000091

больше 8 лет назад

GitHub Branch Source Plugin connects to a user-specified GitHub API URL (e.g. GitHub Enterprise) as part of form validation and completion (e.g. to verify Scan Credentials are correct). This functionality improperly checked permissions, allowing any user with Overall/Read access to Jenkins to connect to any web server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-w66r-f5gg-gqwm

больше 3 лет назад

Jenkins GitHub Branch Source Plugin vulnerable to Cross-Site Request Forgery

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-1000091

GitHub Branch Source Plugin connects to a user-specified GitHub API URL (e.g. GitHub Enterprise) as part of form validation and completion (e.g. to verify Scan Credentials are correct). This functionality improperly checked permissions, allowing any user with Overall/Read access to Jenkins to connect to any web server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery.

CVSS3: 6.3
0%
Низкий
больше 8 лет назад
github логотип
GHSA-w66r-f5gg-gqwm

Jenkins GitHub Branch Source Plugin vulnerable to Cross-Site Request Forgery

CVSS3: 6.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу