Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1td2cyLTN4cHYtNXYyOM4AAoGG
CSRF vulnerability in Jenkins Micro Focus Application Automation Tools Plugin
Micro Focus Application Automation Tools Plugin 6.7 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to connect to attacker-specified URLs using attacker-specified username and password.
Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Micro Focus Application Automation Tools Plugin 6.8 requires POST requests and Overall/Administer permission for the affected form validation methods.
Permalink: https://github.com/advisories/GHSA-mwg2-3xpv-5v28JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1td2cyLTN4cHYtNXYyOM4AAoGG
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 1 year ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
EPSS Percentage: 0.00053
EPSS Percentile: 0.22502
Identifiers: GHSA-mwg2-3xpv-5v28, CVE-2021-22512
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-22512
- https://www.jenkins.io/security/advisory/2021-04-07/#SECURITY-2132
- https://github.com/jenkinsci/hpe-application-automation-tools-plugin/commit/497a143d9a95e9c937501ca329fe0dae22a0d9cd
- https://github.com/advisories/GHSA-mwg2-3xpv-5v28
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:hp-application-automation-tools-plugin
Affected Version Ranges: <= 6.7Fixed in: 6.8