CVE-2022-25200 – com.checkmarx.jenkins:checkmarx
Package
Manager: maven
Name: com.checkmarx.jenkins:checkmarx
Vulnerable Version: >=0 <2022.1.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00059 pctl0.18648
Details
CSRF vulnerability in Jenkins Checkmarx Plugin allow capturing credentials Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Metadata
Created: 2022-02-16T00:01:20Z
Modified: 2022-12-01T22:24:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-5pcf-vxm3-frph/GHSA-5pcf-vxm3-frph.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-5pcf-vxm3-frph
Finding: F007
Auto approve: 1