CVE-2021-22513 – org.jenkins-ci.plugins:hp-application-automation-tools-plugin
Package
Manager: maven
Name: org.jenkins-ci.plugins:hp-application-automation-tools-plugin
Vulnerable Version: >=0 <7.2.3-beta
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00139 pctl0.34569
Details
Missing permission checks in Micro Focus Application Automation Tools Plugin Micro Focus Application Automation Tools Plugin 6.7 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to connect to attacker-specified URLs using attacker-specified username and password. Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. Micro Focus Application Automation Tools Plugin 6.8 requires POST requests and Overall/Administer permission for the affected form validation methods.
Metadata
Created: 2022-05-24T17:46:58Z
Modified: 2022-12-13T19:14:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7qp2-rgxr-29q4/GHSA-7qp2-rgxr-29q4.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-7qp2-rgxr-29q4
Finding: F039
Auto approve: 1