[MAVEN:GHSA-2PJ6-5HQC-W5X9] CSRF vulnerability in Jenkins SWAMP Plugin allows capturing credentials
Severity
Moderate
Affected Packages
1
CVEs
1
WAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.\
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Package | Affected Version |
---|---|
pkg:maven/org.continuousassurance.swamp.jenkins/swamp | <= 1.2.6 |
- ID
- MAVEN:GHSA-2PJ6-5HQC-W5X9
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-2pj6-5hqc-w5x9
- Published
-
2022-02-16T00:01:12
(2 years ago) - Modified
-
2023-01-27T05:00:35
(20 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.continuousassurance.swamp.jenkins/swamp | org.continuousassurance.swamp.jenkins | swamp | <= 1.2.6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |