[MAVEN:GHSA-M6GF-P26P-MX2W] Jenkins Docker Plugin contains Cross-Site Request Forgery

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 1

A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Package Affected Version
pkg:maven/io.jenkins.docker/docker-plugin < 1.1.7
Package Fixed Version
pkg:maven/io.jenkins.docker/docker-plugin = 1.1.7
ID
MAVEN:GHSA-M6GF-P26P-MX2W
Severity
high
URL
https://github.com/advisories/GHSA-m6gf-p26p-mx2w
Published
2022-05-24T16:50:03
(2 years ago)
Modified
2023-12-19T14:55:17
(9 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/io.jenkins.docker/docker-plugin io.jenkins.docker docker-plugin < 1.1.7
Fixed pkg:maven/io.jenkins.docker/docker-plugin io.jenkins.docker docker-plugin = 1.1.7
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...