Jenkins MongoDB Plugin 1.3 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to gain access to some metadata of any arbitrary files on the Jenkins controller.
Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
As of publication of this advisory, there is no fix.
{ "nvd_published_at": "2020-09-16T14:15:00Z", "cwe_ids": [ "CWE-352" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-12-29T01:44:43Z" }