GHSA-gh85-mq87-r7v3

Suggest an improvement
Source
https://github.com/advisories/GHSA-gh85-mq87-r7v3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-gh85-mq87-r7v3/GHSA-gh85-mq87-r7v3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gh85-mq87-r7v3
Aliases
Published
2022-05-14T03:13:13Z
Modified
2024-02-16T08:11:06.358133Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Jenkins GitHub Plugin server-side request forgery vulnerability exists
Details

A server-side request forgery vulnerability exists in Jenkins GitHub Plugin 1.29.0 and older in GitHubPluginConfig.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

Database specific
{
    "nvd_published_at": "2018-06-05T20:29:00Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-09T21:16:37Z"
}
References

Affected packages

Maven / com.coravy.hudson.plugins.github:github

Package

Name
com.coravy.hudson.plugins.github:github
View open source insights on deps.dev
Purl
pkg:maven/com.coravy.hudson.plugins.github/github

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.29.1

Affected versions

0.*

0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9

1.*

1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.9.1
1.10
1.11
1.11.1
1.11.2
1.11.3
1.12.0-alpha-1
1.12.0
1.12.1
1.13.0-alpha-1
1.13.0-alpha-2
1.13.0
1.13.1
1.13.2
1.13.3
1.14.0-alpha-1
1.14.0-alpha-2
1.14.0
1.14.1
1.14.2
1.15.0
1.16.0
1.17.0
1.17.1
1.18.0
1.18.1
1.18.2
1.19.0
1.19.1
1.19.2
1.19.3
1.20.0
1.21.0
1.21.1
1.22.0
1.22.1
1.22.2
1.22.3
1.22.4
1.23.0
1.23.1
1.24.0
1.25.0
1.25.1
1.26.0
1.26.1
1.26.2
1.27.0
1.28.0
1.28.1
1.29.0

Database specific

{
    "last_known_affected_version_range": "<= 1.29.0"
}