Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not perform a permission check in a connection test HTTP endpoint.
This allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.
Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Build Failure Analyzer Plugin 2.4.2 requires POST requests and Overall/Administer permission for the affected HTTP endpoint.
{
"github_reviewed": true,
"severity": "MODERATE",
"cwe_ids": [
"CWE-862"
],
"nvd_published_at": "2023-09-20T17:15:12Z",
"github_reviewed_at": "2023-09-21T21:37:30Z"
}