Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ncnBwLWd4NWgtcHZoOM4AAgeH
Jenkins XebiaLabs XL Deploy Plugin vulnerable to Cross-site request forgery (CSRF)
A missing permission check in a form validation method in Jenkins XebiaLabs XL Deploy Plugin allows users with Overall/Read permission to initiate a connection test to an attacker-specified server with attacker-specified credentials.
Additionally, the form validation method does not require POST requests, resulting in a CSRF vulnerability.
Permalink: https://github.com/advisories/GHSA-grpp-gx5h-pvh8JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ncnBwLWd4NWgtcHZoOM4AAgeH
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 11 months ago
CVSS Score: 4.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Identifiers: GHSA-grpp-gx5h-pvh8, CVE-2019-10304
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10304
- https://jenkins.io/security/advisory/2019-04-17/#SECURITY-983
- https://web.archive.org/web/20200227075952/http://www.securityfocus.com/bid/108045
- https://github.com/jenkinsci/xldeploy-plugin/commit/5acf9d797fe0afb4defa7c1d5e198103fcdb6989
- https://github.com/advisories/GHSA-grpp-gx5h-pvh8
Blast Radius: 1.0
Affected Packages
maven:com.xebialabs.deployit.ci:deployit-plugin
Affected Version Ranges: < 7.5.5Fixed in: 7.5.5