logo

CVE-2018-1000418 org.jvnet.hudson.plugins:hipchat

Package

Manager: maven
Name: org.jvnet.hudson.plugins:hipchat
Vulnerable Version: >=0 <2.2.1

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00214 pctl0.43974

Details

Jenkins HipChat Plugin allows credential capture due to incorrect authorization An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to send test notifications to an attacker-specified HipChat server with attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. As of version 2.2.1, this form validation method requires POST requests and Overall/Administer permissions.

Metadata

Created: 2022-05-13T01:18:46Z
Modified: 2022-11-22T19:47:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w3f7-2qfw-348x/GHSA-w3f7-2qfw-348x.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-w3f7-2qfw-348x
Finding: F006
Auto approve: 1