Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00ZzVmLXczbWgtdzk5bc4AA3vY
Jenkins Nexus Platform Plugin missing permission check
Jenkins Nexus Platform Plugin 3.18.0-03 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Nexus Platform Plugin 3.18.1-01 requires POST requests and Overall/Administer permission for the affected form validation methods.
Permalink: https://github.com/advisories/GHSA-4g5f-w3mh-w99mJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00ZzVmLXczbWgtdzk5bc4AA3vY
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 12 months ago
Updated: 12 months ago
CVSS Score: 4.2
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Identifiers: GHSA-4g5f-w3mh-w99m, CVE-2023-50769
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-50769
- https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3203
- http://www.openwall.com/lists/oss-security/2023/12/13/4
- https://github.com/jenkinsci/nexus-platform-plugin/pull/291
- https://github.com/jenkinsci/nexus-platform-plugin/commit/1d5e1e9e457af5e8ce8c9a403933d6cb73542dbd
- https://github.com/advisories/GHSA-4g5f-w3mh-w99m
Blast Radius: 1.0
Affected Packages
maven:org.sonatype.nexus.ci:nexus-jenkins-plugin
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: < 3.18.1-01
Fixed in: 3.18.1-01
All affected versions:
All unaffected versions: