logo

CVE-2022-25200 com.checkmarx.jenkins:checkmarx

Package

Manager: maven
Name: com.checkmarx.jenkins:checkmarx
Vulnerable Version: >=0 <2022.1.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00059 pctl0.18648

Details

CSRF vulnerability in Jenkins Checkmarx Plugin allow capturing credentials Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Metadata

Created: 2022-02-16T00:01:20Z
Modified: 2022-12-01T22:24:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-5pcf-vxm3-frph/GHSA-5pcf-vxm3-frph.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-5pcf-vxm3-frph
Finding: F007
Auto approve: 1