CVE-2020-2094 – org.jenkins-ci.plugins:cloudbees-jenkins-advisor
Package
Manager: maven
Name: org.jenkins-ci.plugins:cloudbees-jenkins-advisor
Vulnerable Version: >=0 <3.0.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00089 pctl0.26263
Details
Missing permission checks in Health Advisor by CloudBees Plugin Health Advisor by CloudBees Plugin 3.0 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to send an email with fixed content to an attacker-specified recipient. Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability. Health Advisor by CloudBees Plugin 3.0.1 requires POST requests and Overall/Administer permission for the affected form validation methods.
Metadata
Created: 2022-05-24T17:06:23Z
Modified: 2022-12-21T16:43:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h72v-652w-xv64/GHSA-h72v-652w-xv64.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-h72v-652w-xv64
Finding: F039
Auto approve: 1