logo

CVE-2023-39154 com.qualys.plugins:qualys-was

Package

Manager: maven
Name: com.qualys.plugins:qualys-was
Vulnerable Version: >=0 <2.0.11

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00047 pctl0.13836

Details

Incorrect permission checks in Qualys Web App Scanning Connector Plugin allow capturing credentials Qualys Web App Scanning Connector Plugin 2.0.10 and earlier does not correctly perform permission checks in several HTTP endpoints. This allows attackers with global Item/Configure permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Qualys Web App Scanning Connector Plugin 2.0.11 requires the appropriate permissions for the affected HTTP endpoints.

Metadata

Created: 2023-07-26T15:30:57Z
Modified: 2023-07-31T19:01:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-8wgf-3mrj-73x7/GHSA-8wgf-3mrj-73x7.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-8wgf-3mrj-73x7
Finding: F006
Auto approve: 1