GHSA-4xmf-344q-m4cc

Suggest an improvement
Source
https://github.com/advisories/GHSA-4xmf-344q-m4cc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-4xmf-344q-m4cc/GHSA-4xmf-344q-m4cc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4xmf-344q-m4cc
Aliases
  • CVE-2023-4302
Published
2023-08-22T00:31:10Z
Modified
2024-02-16T08:15:44.654749Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Jenkins Fortify Plugin missing permission check
Details

Jenkins Fortify Plugin 22.1.38 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Fortify Plugin 22.2.39 requires POST requests and the appropriate permissions for the affected HTTP endpoints.

Database specific
{
    "nvd_published_at": "2023-08-21T23:15:09Z",
    "cwe_ids": [
        "CWE-862"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-22T17:53:47Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:fortify

Package

Name
org.jenkins-ci.plugins:fortify
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/fortify

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
22.2.39

Affected versions

19.*

19.1.28
19.1.29
19.2.30

20.*

20.1.32
20.1.33
20.2.34
20.2.35

21.*

21.1.36
21.2.37

22.*

22.1.38

Database specific

{
    "last_known_affected_version_range": "<= 22.1.38"
}