[MAVEN:GHSA-GRMG-5Q49-MQMF] Jenkins Crowd 2 Integration Plugin server-side request forgery vulnerability
Severity
Moderate
Affected Packages
1
Fixed Packages
1
CVEs
1
An improper authorization vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java that allows attackers to have Jenkins perform a connection test, connecting to an attacker-specified server with attacker-specified credentials and connection settings.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/crowd2 | <= 2.0.0 |
Package | Fixed Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/crowd2 | = 2.0.1 |
- ID
- MAVEN:GHSA-GRMG-5Q49-MQMF
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-grmg-5q49-mqmf
- Published
-
2022-05-14T01:38:17
(2 years ago) - Modified
-
2024-01-09T21:35:50
(8 months ago) - Rights
- Maven Security Team
- Other Advisories
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |