[MAVEN:GHSA-GRMG-5Q49-MQMF] Jenkins Crowd 2 Integration Plugin server-side request forgery vulnerability

Severity Moderate
Affected Packages 1
Fixed Packages 1
CVEs 1

An improper authorization vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java that allows attackers to have Jenkins perform a connection test, connecting to an attacker-specified server with attacker-specified credentials and connection settings.

Package Affected Version
pkg:maven/org.jenkins-ci.plugins/crowd2 <= 2.0.0
Package Fixed Version
pkg:maven/org.jenkins-ci.plugins/crowd2 = 2.0.1
ID
MAVEN:GHSA-GRMG-5Q49-MQMF
Severity
moderate
URL
https://github.com/advisories/GHSA-grmg-5q49-mqmf
Published
2022-05-14T01:38:17
(2 years ago)
Modified
2024-01-09T21:35:50
(8 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/crowd2 org.jenkins-ci.plugins crowd2 <= 2.0.0
Fixed pkg:maven/org.jenkins-ci.plugins/crowd2 org.jenkins-ci.plugins crowd2 = 2.0.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...