[MAVEN:GHSA-M6GF-P26P-MX2W] Jenkins Docker Plugin contains Cross-Site Request Forgery
Severity
High
Affected Packages
1
Fixed Packages
1
CVEs
1
A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Package | Affected Version |
---|---|
pkg:maven/io.jenkins.docker/docker-plugin | < 1.1.7 |
Package | Fixed Version |
---|---|
pkg:maven/io.jenkins.docker/docker-plugin | = 1.1.7 |
- ID
- MAVEN:GHSA-M6GF-P26P-MX2W
- Severity
- high
- URL
- https://github.com/advisories/GHSA-m6gf-p26p-mx2w
- Published
-
2022-05-24T16:50:03
(2 years ago) - Modified
-
2023-12-19T14:55:17
(9 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/io.jenkins.docker/docker-plugin | io.jenkins.docker | docker-plugin | < 1.1.7 | |||
Fixed | pkg:maven/io.jenkins.docker/docker-plugin | io.jenkins.docker | docker-plugin | = 1.1.7 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |