GHSA-5v46-54vj-4mjq

Suggest an improvement
Source
https://github.com/advisories/GHSA-5v46-54vj-4mjq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-5v46-54vj-4mjq/GHSA-5v46-54vj-4mjq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5v46-54vj-4mjq
Aliases
Published
2023-07-12T18:30:39Z
Modified
2024-02-16T08:07:55.508274Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Jenkins ElasticBox CI Plugin vulnerable to cross-site request forgery
Details

Jenkins ElasticBox CI Plugin 5.0.1 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Database specific
{
    "nvd_published_at": "2023-07-12T16:15:14Z",
    "cwe_ids": [
        "CWE-352"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-12T22:29:58Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:elasticbox

Package

Name
org.jenkins-ci.plugins:elasticbox
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/elasticbox

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
5.0.3

Affected versions

0.*

0.7
0.7.1
0.7.2
0.7.3
0.7.4
0.8
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
0.9
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
0.9.7
0.9.8
0.9.8.1
0.9.8.2
0.9.9
0.9.10
0.9.10.1
0.9.10.2
0.9.11
0.9.12
0.9.13
0.9.14

4.*

4.0.0
4.0.1
4.0.2
4.0.3
4.0.4
4.0.5
4.0.6
4.0.7
4.0.8