GHSA-rv6g-3v76-cvf9

Suggest an improvement
Source
https://github.com/advisories/GHSA-rv6g-3v76-cvf9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-rv6g-3v76-cvf9/GHSA-rv6g-3v76-cvf9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rv6g-3v76-cvf9
Aliases
Published
2023-05-16T18:30:16Z
Modified
2024-02-16T08:22:03.827598Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Jenkins Azure VM Agents Plugin missing permission checks
Details

Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.

Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Azure VM Agents Plugin 853.v4a1add947520 requires POST requests and the appropriate permissions for the affected HTTP endpoints.

Database specific
{
    "nvd_published_at": "2023-05-16T17:15:11Z",
    "cwe_ids": [
        "CWE-732"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-05-17T03:30:10Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:azure-vm-agents

Package

Name
org.jenkins-ci.plugins:azure-vm-agents
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/azure-vm-agents

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
853.v4a

Affected versions

0.*

0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5
0.4.5.1
0.4.6
0.4.7
0.4.7.1
0.4.8
0.5.0
0.6.0
0.6.1
0.6.2
0.7.0
0.7.1
0.7.2
0.7.2.1
0.7.3
0.7.4
0.7.5
0.8.0
0.8.1
0.9.0

1.*

1.0.0
1.0.1
1.1.0
1.1.1
1.2.0
1.2.1
1.2.2
1.3.0
1.4.0
1.4.1
1.5.0
1.5.1
1.5.2
1.5.3

759.*

759.v1c1f79435487

760.*

760.ve25700ee68cc

761.*

761.v8d93e0672563

763.*

763.vedbebdfd1222

764.*

764.vf22cf908cb69

765.*

765.vbb9943c5070c

766.*

766.vbdb82c53e70a

768.*

768.vb8b0d31eef4f

774.*

774.v0cee503baa25

775.*

775.v0bbd3d0d016a

777.*

777.v276476e1344c

778.*

778.va3924310a4eb

779.*

779.v5ea1414ec40f

780.*

780.v50d067d02f76

781.*

781.v5877a4d99d28

782.*

782.vb41dc00d85b1

783.*

783.v58077630847d

789.*

789.va0c40e4d0070

793.*

793.vbb935f9be778

794.*

794.v8a62ee91dc70

795.*

795.vd5903dae1139

797.*

797.v31f530348574

799.*

799.va4c741108611

801.*

801.v37f3eab68cf0

802.*

802.vbac7a8a5d5e2

803.*

803.vef83d334600f

804.*

804.ve77d45cc9464

805.*

805.v424cc2981d7a

806.*

806.vae775cde5efa

808.*

808.v9d1999587120

810.*

810.v0a97a847315a

813.*

813.v8ae017133e51

815.*

815.vf2f07da070ee

816.*

816.v27bbb474b2b2

822.*

822.v3a18fc3d2de1

824.*

824.v31b_9c29f67fd

825.*

825.v470cb_9e7361a_

842.*

842.v9fedb_4cc1b_e9

845.*

845.v35ee7c5570db_

846.*

846.v5a_f7e3dce959

851.*

851.v16b_dcb_e85c85

852.*

852.v8d35f0960a_43