Lucene search

K
githubGitHub Advisory DatabaseGHSA-8GC7-WHPH-RX5Q
HistoryJul 12, 2023 - 6:30 p.m.

Jenkins Test Results Aggregator Plugin vulnerable to Cross Site Request Forgery

2023-07-1218:30:38
CWE-352
GitHub Advisory Database
github.com
7
jenkins
test results aggregator
plugin
cross site request forgery
http endpoint
validation
permission check
overall
read permission
csrf vulnerability
software

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

0.0005 Low

EPSS

Percentile

17.2%

Jenkins Test Results Aggregator Plugin 1.2.13 and earlier does not perform a permission check in an HTTP endpoint implementing form validation.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.

Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Affected configurations

Vulners
Node
jenkinstest_results_aggregatorRange1.2.13jenkins

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

0.0005 Low

EPSS

Percentile

17.2%

Related for GHSA-8GC7-WHPH-RX5Q