Jenkins SCM HttpClient Plugin vulnerable to Cross-Site Request Forgery
Moderate severity
GitHub Reviewed
Published
Sep 22, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Description
Published by the National Vulnerability Database
Sep 21, 2022
Published to the GitHub Advisory Database
Sep 22, 2022
Reviewed
Sep 23, 2022
Last updated
Feb 2, 2023
SCM HttpClient Plugin 1.5 and earlier does not perform permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
References