GHSA-r52h-fjm7-93j8

Suggest an improvement
Source
https://github.com/advisories/GHSA-r52h-fjm7-93j8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-r52h-fjm7-93j8/GHSA-r52h-fjm7-93j8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r52h-fjm7-93j8
Aliases
Published
2024-04-17T15:30:43Z
Modified
2024-04-17T17:58:33.077878Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
BlazeMeter Jenkins plugin vulnerable to Cross-Site Request Forgery
Details

Versions of the BlazeMeter Jenkins plugin prior to 4.22 contain a flaw which results in credential enumeration.

References

Affected packages

Maven / com.blazemeter.plugins:BlazeMeterJenkinsPlugin

Package

Name
com.blazemeter.plugins:BlazeMeterJenkinsPlugin
View open source insights on deps.dev
Purl
pkg:maven/com.blazemeter.plugins/BlazeMeterJenkinsPlugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.22

Affected versions

1.*

1.0-beta-1
1.01-beta-2
1.02-beta-3
1.04-beta-1
1.05-beta-1
1.06-beta-1
1.07-beta-1
1.08-beta-1

2.*

2.0
2.1
2.2
2.2.1
2.3
2.4
2.5
2.5.2
2.6
2.7
2.8

3.*

3.0
3.1

4.*

4.0
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
4.9
4.10
4.11
4.12
4.13
4.14
4.15
4.16
4.17
4.18
4.19
4.20
4.21