Lucene search

K
githubGitHub Advisory DatabaseGHSA-J9H4-P6P7-8652
HistoryApr 02, 2023 - 9:30 p.m.

Jenkins OctoPerf Load Testing Plugin vulnerable to credential capture

2023-04-0221:30:17
CWE-862
GitHub Advisory Database
github.com
7
jenkins
octoperf load testing plugin
4.5.1
4.5.2
permission check
http endpoint
credential capture
security issue

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

27.5%

OctoPerf Load Testing Plugin Plugin 4.5.1 and earlier does not perform a permission check in a connection test HTTP endpoint.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

OctoPerf Load Testing Plugin Plugin 4.5.2 properly performs a permission check when accessing the affected connection test HTTP endpoint.

Affected configurations

Vulners
Node
org.jenkinsci.pluginsoctoperfRange<4.5.2
VendorProductVersionCPE
org.jenkinsci.pluginsoctoperf*cpe:2.3:a:org.jenkinsci.plugins:octoperf:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

27.5%

Related for GHSA-J9H4-P6P7-8652