logo

CVE-2023-28675 org.jenkinsci.plugins:octoperf

Package

Manager: maven
Name: org.jenkinsci.plugins:octoperf
Vulnerable Version: >=0 <4.5.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00124 pctl0.32293

Details

Jenkins OctoPerf Load Testing Plugin missing permission check allows for unauthorized server connections Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to a previously configured Octoperf server using attacker-specified credentials. Additionally, these endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. OctoPerf Load Testing Plugin Plugin 4.5.3 requires POST requests and the appropriate permissions for the affected HTTP endpoints.

Metadata

Created: 2023-04-02T21:30:17Z
Modified: 2025-02-25T21:40:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-p3w6-3f7f-pm98/GHSA-p3w6-3f7f-pm98.json
CWE IDs: ["CWE-284", "CWE-862"]
Alternative ID: GHSA-p3w6-3f7f-pm98
Finding: F039
Auto approve: 1