Jenkins Benchmark Evaluator Plugin missing permission check
Moderate severity
GitHub Reviewed
Published
Jul 12, 2023
to the GitHub Advisory Database
•
Updated Nov 8, 2023
Package
Affected versions
<= 1.0.1
Patched versions
None
Description
Published by the National Vulnerability Database
Jul 12, 2023
Published to the GitHub Advisory Database
Jul 12, 2023
Reviewed
Jul 12, 2023
Last updated
Nov 8, 2023
Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories,
.csv
, and.ycsb
files on the Jenkins controller file system.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
References