Jenkins mabl Plugin vulnerable to cross-site request forgery
Moderate severity
GitHub Reviewed
Published
Jul 12, 2023
to the GitHub Advisory Database
•
Updated Nov 7, 2023
Package
Affected versions
< 0.0.47
Patched versions
0.0.47
Description
Published by the National Vulnerability Database
Jul 12, 2023
Published to the GitHub Advisory Database
Jul 12, 2023
Reviewed
Jul 12, 2023
Last updated
Nov 7, 2023
Jenkins mabl Plugin 0.0.46 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
mabl Plugin 0.0.47 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
References