GHSA-gg44-xm5p-x9cm

Suggest an improvement
Source
https://github.com/advisories/GHSA-gg44-xm5p-x9cm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-gg44-xm5p-x9cm/GHSA-gg44-xm5p-x9cm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gg44-xm5p-x9cm
Aliases
Published
2023-07-12T18:30:39Z
Modified
2024-02-16T08:09:17.552352Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Jenkins ElasticBox CI Plugin missing permission check
Details

Jenkins ElasticBox CI Plugin 5.0.1 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Database specific
{
    "nvd_published_at": "2023-07-12T16:15:14Z",
    "cwe_ids": [
        "CWE-862"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-12T22:30:10Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:elasticbox

Package

Name
org.jenkins-ci.plugins:elasticbox
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/elasticbox

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
5.0.3

Affected versions

0.*

0.7
0.7.1
0.7.2
0.7.3
0.7.4
0.8
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
0.9
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
0.9.7
0.9.8
0.9.8.1
0.9.8.2
0.9.9
0.9.10
0.9.10.1
0.9.10.2
0.9.11
0.9.12
0.9.13
0.9.14

4.*

4.0.0
4.0.1
4.0.2
4.0.3
4.0.4
4.0.5
4.0.6
4.0.7
4.0.8