Lucene search

K
githubGitHub Advisory DatabaseGHSA-5Q63-JVC9-QPHV
HistoryMay 13, 2022 - 1:25 a.m.

Cross-site request forgery vulnerability in Jenkins Nomad Plugin

2022-05-1301:25:41
CWE-352
GitHub Advisory Database
github.com
5
cross-site request forgery
jenkins nomad plugin
nomadcloud.descriptorimpl
form validation
server connection vulnerability

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

58.6%

A cross-site request forgery vulnerability in Jenkins Nomad Plugin in the NomadCloud.DescriptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.

Affected configurations

Vulners
Node
org.jenkins-ci.pluginsnomadRange<0.5.1
VendorProductVersionCPE
org.jenkins-ci.pluginsnomad*cpe:2.3:a:org.jenkins-ci.plugins:nomad:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

58.6%

Related for GHSA-5Q63-JVC9-QPHV