[MAVEN:GHSA-2PJ6-5HQC-W5X9] CSRF vulnerability in Jenkins SWAMP Plugin allows capturing credentials

Severity Moderate
Affected Packages 1
CVEs 1

WAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.\

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

ID
MAVEN:GHSA-2PJ6-5HQC-W5X9
Severity
moderate
URL
https://github.com/advisories/GHSA-2pj6-5hqc-w5x9
Published
2022-02-16T00:01:12
(2 years ago)
Modified
2023-01-27T05:00:35
(20 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.continuousassurance.swamp.jenkins/swamp org.continuousassurance.swamp.jenkins swamp <= 1.2.6
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...