CVE-2023-28675 – org.jenkinsci.plugins:octoperf
Package
Manager: maven
Name: org.jenkinsci.plugins:octoperf
Vulnerable Version: >=0 <4.5.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00124 pctl0.32293
Details
Jenkins OctoPerf Load Testing Plugin missing permission check allows for unauthorized server connections Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to a previously configured Octoperf server using attacker-specified credentials. Additionally, these endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. OctoPerf Load Testing Plugin Plugin 4.5.3 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
Metadata
Created: 2023-04-02T21:30:17Z
Modified: 2025-02-25T21:40:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-p3w6-3f7f-pm98/GHSA-p3w6-3f7f-pm98.json
CWE IDs: ["CWE-284", "CWE-862"]
Alternative ID: GHSA-p3w6-3f7f-pm98
Finding: F039
Auto approve: 1