[MAVEN:GHSA-QWW5-P626-RFPF] Jenkins JX Resources Plugin cross-site request forgery vulnerability

Severity Moderate
Affected Packages 1
Fixed Packages 1
CVEs 1

Jenkins jx-resources Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified Kubernetes server and obtain information about an attacker-specified namespace. Doing so might also leak service account credentials used for the connection. Additionally, it allowed attackers to obtain the value of any attacker-specified environment variable for the Jenkins controller process.

Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.

This form validation method now requires POST requests and Overall/Administer permissions.

Package Affected Version
pkg:maven/org.jenkins-ci.plugins/jx-resources <= 1.0.36
Package Fixed Version
pkg:maven/org.jenkins-ci.plugins/jx-resources = 1.0.37
ID
MAVEN:GHSA-QWW5-P626-RFPF
Severity
moderate
URL
https://github.com/advisories/GHSA-qww5-p626-rfpf
Published
2022-05-24T16:47:43
(2 years ago)
Modified
2023-10-26T22:26:51
(10 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/jx-resources org.jenkins-ci.plugins jx-resources <= 1.0.36
Fixed pkg:maven/org.jenkins-ci.plugins/jx-resources org.jenkins-ci.plugins jx-resources = 1.0.37
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...