logo

CVE-2020-2093 org.jenkins-ci.plugins:cloudbees-jenkins-advisor

Package

Manager: maven
Name: org.jenkins-ci.plugins:cloudbees-jenkins-advisor
Vulnerable Version: >=0 <3.0.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00089 pctl0.2638

Details

CSRF vulnerability in Health Advisor by CloudBees Plugin Health Advisor by CloudBees Plugin 3.0 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to send an email with fixed content to an attacker-specified recipient. Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability. Health Advisor by CloudBees Plugin 3.0.1 requires POST requests and Overall/Administer permission for the affected form validation methods.

Metadata

Created: 2022-05-24T17:06:22Z
Modified: 2022-12-21T16:42:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-fc92-8r77-9297/GHSA-fc92-8r77-9297.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-fc92-8r77-9297
Finding: F007
Auto approve: 1