Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wM3c2LTNmN2YtcG05OM4AAygK
Jenkins OctoPerf Load Testing Plugin missing permission check allows for unauthorized server connections
Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to a previously configured Octoperf server using attacker-specified credentials.
Additionally, these endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
OctoPerf Load Testing Plugin Plugin 4.5.3 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
Permalink: https://github.com/advisories/GHSA-p3w6-3f7f-pm98JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wM3c2LTNmN2YtcG05OM4AAygK
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: over 1 year ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
EPSS Percentage: 0.00054
EPSS Percentile: 0.23527
Identifiers: GHSA-p3w6-3f7f-pm98, CVE-2023-28675
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-28675
- https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(4)
- https://github.com/advisories/GHSA-p3w6-3f7f-pm98
Affected Packages
maven:org.jenkinsci.plugins:octoperf
Affected Version Ranges: <= 4.5.2Fixed in: 4.5.3