CVE-2023-37965 – org.jenkins-ci.plugins:elasticbox
Package
Manager: maven
Name: org.jenkins-ci.plugins:elasticbox
Vulnerable Version: >=0 <=5.0.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00128 pctl0.33053
Details
Jenkins ElasticBox CI Plugin missing permission check Jenkins ElasticBox CI Plugin 5.0.1 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Metadata
Created: 2023-07-12T18:30:39Z
Modified: 2023-07-12T22:30:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-gg44-xm5p-x9cm/GHSA-gg44-xm5p-x9cm.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-gg44-xm5p-x9cm
Finding: F039
Auto approve: 1