CVE-2018-1000605 – org.jenkins-ci.plugins:collabnet
Package
Manager: maven
Name: org.jenkins-ci.plugins:collabnet
Vulnerable Version: >=0 <2.0.5
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00042 pctl0.12038
Details
Jenkins CollabNet Plugin man in the middle vulnerability A man in the middle vulnerability exists in Jenkins CollabNet Plugin 2.0.4 and earlier in CollabNetApp.java, CollabNetPlugin.java, CNFormFieldValidator.java that allows attackers to impersonate any service that Jenkins connects to. CollabNet Plugin 2.0.5 and newer no longer does that. It instead requires users to opt in to disabling SSL/TLS certificate validation by setting the system property hudson.plugins.collabnet.CollabNetPlugin.skipSslValidation to true. This feature applies to connections by this plugin only.
Metadata
Created: 2022-05-14T02:56:39Z
Modified: 2022-12-12T17:01:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-m8x2-4gc8-9v3r/GHSA-m8x2-4gc8-9v3r.json
CWE IDs: ["CWE-295"]
Alternative ID: GHSA-m8x2-4gc8-9v3r
Finding: F163
Auto approve: 1