Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mYzkyLThyNzctOTI5N84AAjR-
CSRF vulnerability in Health Advisor by CloudBees Plugin
Health Advisor by CloudBees Plugin 3.0 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to send an email with fixed content to an attacker-specified recipient.
Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability.
Health Advisor by CloudBees Plugin 3.0.1 requires POST requests and Overall/Administer permission for the affected form validation methods.
Permalink: https://github.com/advisories/GHSA-fc92-8r77-9297JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mYzkyLThyNzctOTI5N84AAjR-
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 12 months ago
CVSS Score: 5.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
EPSS Percentage: 0.00073
EPSS Percentile: 0.325
Identifiers: GHSA-fc92-8r77-9297, CVE-2020-2093
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2093
- https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1708
- https://github.com/jenkinsci/cloudbees-jenkins-advisor-plugin/commit/f53fe8a41a1566fdd7d2996779f6c5684ef3e2df
- https://github.com/advisories/GHSA-fc92-8r77-9297
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:cloudbees-jenkins-advisor
Affected Version Ranges: < 3.0.1Fixed in: 3.0.1