Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12YzdnLTQyNjktZjdod84AAl8U
Missing permission check in Blue Ocean Plugin
Updated 2020-09-16
This entry previously misidentified the problematic behavior. The HTTP request itself is legitimate, but only authorized users should be able to perform it.
Original Description
Blue Ocean Plugin 1.23.2 and earlier does not perform permission checks in several HTTP endpoints implementing connection tests.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Blue Ocean Plugin 1.23.3 requires Item/Create permission to perform these connection tests.
Permalink: https://github.com/advisories/GHSA-vc7g-4269-f7hwJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12YzdnLTQyNjktZjdod84AAl8U
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 11 months ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Identifiers: GHSA-vc7g-4269-f7hw, CVE-2020-2255
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2255
- https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961
- http://www.openwall.com/lists/oss-security/2020/09/16/3
- https://github.com/jenkinsci/blueocean-plugin/commit/659a66aff0d0ad693eab9d2807985d591e102aab
- https://github.com/advisories/GHSA-vc7g-4269-f7hw
Blast Radius: 1.0
Affected Packages
maven:io.jenkins.blueocean:blueocean
Affected Version Ranges: <= 1.23.2Fixed in: 1.23.3