CSRF vulnerability in Jenkins Pipeline Maven Integration Plugin allow capturing credentials
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Oct 26, 2023
Package
Affected versions
< 3.8.3
Patched versions
3.8.3
Description
Published by the National Vulnerability Database
Aug 12, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 20, 2022
Last updated
Oct 26, 2023
Pipeline Maven Integration Plugin 3.8.2 and earlier does not perform a permission check in a method implementing form validation.
This allows users with Overall/Read access to Jenkins to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Pipeline Maven Integration Plugin 3.8.3 requires POST requests and Job/Configure permission for the affected form validation method.
References