logo

CVE-2023-37965 org.jenkins-ci.plugins:elasticbox

Package

Manager: maven
Name: org.jenkins-ci.plugins:elasticbox
Vulnerable Version: >=0 <=5.0.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00128 pctl0.33053

Details

Jenkins ElasticBox CI Plugin missing permission check Jenkins ElasticBox CI Plugin 5.0.1 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Metadata

Created: 2023-07-12T18:30:39Z
Modified: 2023-07-12T22:30:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-gg44-xm5p-x9cm/GHSA-gg44-xm5p-x9cm.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-gg44-xm5p-x9cm
Finding: F039
Auto approve: 1