Lucene search

K
githubGitHub Advisory DatabaseGHSA-PMMR-R9V2-59P8
HistoryMay 16, 2023 - 6:30 p.m.

Jenkins Reverse Proxy Auth Plugin cross-site request forgery vulnerability

2023-05-1618:30:16
CWE-352
GitHub Advisory Database
github.com
5
jenkins
reverse proxy
auth
plugin
cross-site request forgery
vulnerability
ldap
server
credentials
1.7.4
1.7.5
software

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

38.7%

Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier does not require POST requests for a form validation method, resulting in a cross-site request forgery (CSRF) vulnerability.

This vulnerability allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.

Reverse Proxy Auth Plugin 1.7.5 requires POST requests for the affected form validation method.

Affected configurations

Vulners
Node
jenkinsreverse_proxy_authRange<1.7.5jenkins

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

38.7%

Related for GHSA-PMMR-R9V2-59P8