Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS12YzdnLTQyNjktZjdod84AAl8U

Missing permission check in Blue Ocean Plugin

Updated 2020-09-16

This entry previously misidentified the problematic behavior. The HTTP request itself is legitimate, but only authorized users should be able to perform it.

Original Description

Blue Ocean Plugin 1.23.2 and earlier does not perform permission checks in several HTTP endpoints implementing connection tests.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL.

Blue Ocean Plugin 1.23.3 requires Item/Create permission to perform these connection tests.

Permalink: https://github.com/advisories/GHSA-vc7g-4269-f7hw
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12YzdnLTQyNjktZjdod84AAl8U
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 4 months ago


CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Identifiers: GHSA-vc7g-4269-f7hw, CVE-2020-2255
References: Repository: https://github.com/jenkinsci/blueocean-plugin
Blast Radius: 1.0

Affected Packages

maven:io.jenkins.blueocean:blueocean
Affected Version Ranges: <= 1.23.2
Fixed in: 1.23.3