Lucene search

K
githubGitHub Advisory DatabaseGHSA-RC33-44QP-VPVQ
HistoryAug 16, 2023 - 3:30 p.m.

Jenkins Gogs Plugin vulnerable to unsafe default behavior and information disclosure

2023-08-1615:30:18
CWE-665
GitHub Advisory Database
github.com
4
jenkins
gogs plugin
unsafe behavior
information disclosure
webhook
endpoint
unauthenticated access
job trigger

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

20.5%

Jenkins Gogs Plugin provides a webhook endpoint at /gogs-webhook that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default.

This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name.

Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it.

As of publication of this advisory, there is no fix.

Affected configurations

Vulners
Node
jenkinsmsteams_webhook_triggerRange1.0.15jenkins

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

20.5%

Related for GHSA-RC33-44QP-VPVQ