GHSA-wvgr-5wgr-c6fj

Suggest an improvement
Source
https://github.com/advisories/GHSA-wvgr-5wgr-c6fj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-wvgr-5wgr-c6fj/GHSA-wvgr-5wgr-c6fj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wvgr-5wgr-c6fj
Aliases
  • CVE-2023-37952
Published
2023-07-12T18:30:38Z
Modified
2024-02-16T08:03:48.207599Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Jenkins mabl Plugin vulnerable to cross-site request forgery
Details

Jenkins mabl Plugin 0.0.46 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

mabl Plugin 0.0.47 requires POST requests and the appropriate permissions for the affected HTTP endpoints.

Database specific
{
    "nvd_published_at": "2023-07-12T16:15:13Z",
    "cwe_ids": [
        "CWE-352"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-12T22:31:28Z"
}
References

Affected packages

Maven / com.mabl.integration.jenkins:mabl-integration

Package

Name
com.mabl.integration.jenkins:mabl-integration
View open source insights on deps.dev
Purl
pkg:maven/com.mabl.integration.jenkins/mabl-integration

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.47

Affected versions

0.*

0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.12
0.0.13
0.0.14
0.0.15
0.0.16
0.0.17
0.0.18
0.0.19
0.0.21
0.0.22
0.0.23
0.0.25
0.0.26
0.0.28
0.0.29
0.0.30
0.0.31
0.0.32
0.0.34
0.0.35
0.0.36
0.0.37
0.0.38
0.0.39
0.0.40
0.0.42
0.0.43
0.0.44
0.0.45
0.0.46