CSRF vulnerability in Jenkins CONS3RT Plugin allow capturing credentials
Moderate severity
GitHub Reviewed
Published
Sep 22, 2022
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Description
Published by the National Vulnerability Database
Sep 21, 2022
Published to the GitHub Advisory Database
Sep 22, 2022
Reviewed
Dec 6, 2022
Last updated
Jan 31, 2023
CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
References