Lucene search

K
githubGitHub Advisory DatabaseGHSA-5R8Q-9FWV-2GPR
HistoryMay 13, 2022 - 1:25 a.m.

Jenkins Slack Notification Plugin CSRF vulnerability and missing permission checks

2022-05-1301:25:43
CWE-352
GitHub Advisory Database
github.com
6
jenkins
slack
notification
plugin
csrf
vulnerability
missing
permission
checks

CVSS2

2.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:S/C:P/I:N/A:N

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.003

Percentile

66.7%

A cross-site request forgery vulnerability in Jenkins Slack Notification Plugin 2.19 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchslack
VendorProductVersionCPE
org.jenkinsci.plugins\slackcpe:2.3:a:org.jenkins:ci.plugins\:slack:*:*:*:*:*:*:*:*

CVSS2

2.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:S/C:P/I:N/A:N

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.003

Percentile

66.7%

Related for GHSA-5R8Q-9FWV-2GPR