GHSA-55q6-r3hm-7ff4

Suggest an improvement
Source
https://github.com/advisories/GHSA-55q6-r3hm-7ff4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-55q6-r3hm-7ff4/GHSA-55q6-r3hm-7ff4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-55q6-r3hm-7ff4
Aliases
Published
2023-09-20T18:30:21Z
Modified
2024-02-16T08:07:45.085091Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Jenkins Build Failure Analyzer Plugin missing permission check
Details

Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not perform a permission check in a connection test HTTP endpoint.

This allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.

Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Build Failure Analyzer Plugin 2.4.2 requires POST requests and Overall/Administer permission for the affected HTTP endpoint.

Database specific
{
    "nvd_published_at": "2023-09-20T17:15:12Z",
    "cwe_ids": [
        "CWE-862"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-09-21T21:37:30Z"
}
References

Affected packages

Maven / com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer

Package

Name
com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer
View open source insights on deps.dev
Purl
pkg:maven/com.sonyericsson.jenkins.plugins.bfa/build-failure-analyzer

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.2

Affected versions

1.*

1.2.0
1.3.0
1.4.0
1.4.1
1.5.0
1.5.1
1.6.0
1.7.0
1.8.0
1.8.1
1.9.0
1.9.1
1.10.0
1.10.2
1.10.3
1.11.0
1.12.0
1.12.1
1.13.0
1.13.1
1.13.2
1.13.3
1.13.4
1.13.5
1.14.0
1.15.0
1.16.0
1.17.0
1.17.1
1.17.2
1.18.0
1.18.1
1.19.0
1.19.1
1.19.2
1.20.0
1.21.0
1.22.0
1.23.0-beta-1
1.23.0
1.23.1
1.23.2
1.24.0
1.24.1
1.24.2
1.25.0
1.25.1
1.26.0
1.27.0
1.27.1

2.*

2.0.0-beta-1
2.0.0
2.0.1
2.1.0
2.2.0
2.2.1
2.3.0
2.4.0
2.4.1