Lucene search

K
githubGitHub Advisory DatabaseGHSA-C8FF-J5GM-6492
HistoryApr 12, 2023 - 6:30 p.m.

Jenkins Report Portal Plugin Cross-Site Request Forgery vulnerability

2023-04-1218:30:36
CWE-352
GitHub Advisory Database
github.com
3
jenkins
report portal
plugin
cross-site request forgery
vulnerability
authentication
csrf

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

80.7%

Jenkins Report Portal Plugin 0.5 and earlier does not perform a permission check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchreportportal

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

80.7%

Related for GHSA-C8FF-J5GM-6492