Lucene search

K
githubGitHub Advisory DatabaseGHSA-R52H-FJM7-93J8
HistoryApr 17, 2024 - 3:30 p.m.

BlazeMeter Jenkins plugin vulnerable to Cross-Site Request Forgery

2024-04-1715:30:43
CWE-352
GitHub Advisory Database
github.com
8
blazemeter
jenkins plugin
cross-site request forgery
credential enumeration

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.0%

Versions of the BlazeMeter Jenkins plugin prior to 4.22 contain a flaw which results in credential enumeration.

Affected configurations

Vulners
Node
com.blazemeter.pluginsblazemeterjenkinspluginRange<4.22
VendorProductVersionCPE
com.blazemeter.pluginsblazemeterjenkinsplugin*cpe:2.3:a:com.blazemeter.plugins:blazemeterjenkinsplugin:*:*:*:*:*:*:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.0%

Related for GHSA-R52H-FJM7-93J8