GHSA-rp4x-xpgf-4xv7

Suggest an improvement
Source
https://github.com/advisories/GHSA-rp4x-xpgf-4xv7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rp4x-xpgf-4xv7/GHSA-rp4x-xpgf-4xv7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rp4x-xpgf-4xv7
Aliases
Published
2022-05-24T17:19:04Z
Modified
2023-11-08T04:02:56.173819Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Complete lack of CSRF protection in Jenkins Selenium Plugin can lead to OS command injection
Details

Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints.

This allows attackers to perform the following actions: - Restart the Selenium Grid hub. - Delete or replace the plugin configuration. - Start, stop, or restart Selenium configurations on specific nodes.

Through carefully chosen configuration parameters, these actions can result in OS command injection on the Jenkins controller.

Database specific
{
    "nvd_published_at": "2020-06-03T13:15:00Z",
    "github_reviewed_at": "2022-12-20T23:03:58Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-352"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins:selenium

Package

Name
org.jenkins-ci.plugins:selenium
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/selenium

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
3.141.59

Affected versions

1.*

1.4
1.5

2.*

2.0
2.1
2.2
2.3
2.4
2.4.1
2.53.0
2.53.1

3.*

3.1.0
3.7.1
3.12.0
3.141.59