logo

CVE-2022-25207 org.jenkins-ci.plugins:sinatra-chef-builder

Package

Manager: maven
Name: org.jenkins-ci.plugins:sinatra-chef-builder
Vulnerable Version: >=0 <=1.20

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00072 pctl0.22598

Details

CSRF vulnerability in Jenkins Chef Sinatra Plugin allow XXE Jenkins Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML. As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Metadata

Created: 2022-02-16T00:01:15Z
Modified: 2023-10-27T16:38:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-x92v-xv3x-9v29/GHSA-x92v-xv3x-9v29.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-x92v-xv3x-9v29
Finding: F007
Auto approve: 1