Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wYzI0LTc1M2otZ21xZs4AAgmR
Jenkins Ansible Tower Plugin missing permission check
Jenkins Ansible Tower Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.
This form validation method now requires POST requests and Overall/Administer permissions.
Permalink: https://github.com/advisories/GHSA-pc24-753j-gmqfJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wYzI0LTc1M2otZ21xZs4AAgmR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 7 months ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-pc24-753j-gmqf, CVE-2019-10311
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10311
- http://www.openwall.com/lists/oss-security/2019/04/30/5
- https://web.archive.org/web/20200227073756/http://www.securityfocus.com/bid/108159
- https://www.jenkins.io/security/advisory/2019-04-30/#SECURITY-1355%20(1)
- https://github.com/advisories/GHSA-pc24-753j-gmqf
Affected Packages
maven:org.jenkins-ci.plugins:ansible-tower
Affected Version Ranges: <= 0.9.1Fixed in: 0.9.2