[MAVEN:GHSA-48Q3-5297-WMMX] CSRF vulnerability in Jenkins CONS3RT Plugin allow capturing credentials

Severity Moderate
Affected Packages 1
CVEs 1

CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in methods implementing form validation.

This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Package Affected Version
pkg:maven/org.jenkins-ci.plugins/cons3rt <= 1.0.0
ID
MAVEN:GHSA-48Q3-5297-WMMX
Severity
moderate
URL
https://github.com/advisories/GHSA-48q3-5297-wmmx
Published
2022-09-22T00:00:26
(2 years ago)
Modified
2023-01-31T05:02:20
(19 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/cons3rt org.jenkins-ci.plugins cons3rt <= 1.0.0
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...