GHSA-w3f7-2qfw-348x

Suggest an improvement
Source
https://github.com/advisories/GHSA-w3f7-2qfw-348x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w3f7-2qfw-348x/GHSA-w3f7-2qfw-348x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-w3f7-2qfw-348x
Aliases
Published
2022-05-13T01:18:46Z
Modified
2023-11-08T03:59:38.527226Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Jenkins HipChat Plugin allows credential capture due to incorrect authorization
Details

An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to send test notifications to an attacker-specified HipChat server with attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. As of version 2.2.1, this form validation method requires POST requests and Overall/Administer permissions.

Database specific
{
    "nvd_published_at": "2019-01-09T23:29:00Z",
    "github_reviewed_at": "2022-11-22T19:47:07Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-863"
    ]
}
References

Affected packages

Maven / org.jvnet.hudson.plugins:hipchat

Package

Name
org.jvnet.hudson.plugins:hipchat
View open source insights on deps.dev
Purl
pkg:maven/org.jvnet.hudson.plugins/hipchat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.1

Affected versions

0.*

0.1.1
0.1.3
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8
0.1.9
0.2.0

1.*

1.0.0

2.*

2.0.0
2.1.0
2.1.1
2.2.0