GHSA-48pq-x3vw-4pqf

Suggest an improvement
Source
https://github.com/advisories/GHSA-48pq-x3vw-4pqf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-48pq-x3vw-4pqf/GHSA-48pq-x3vw-4pqf.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-48pq-x3vw-4pqf
Aliases
Published
2022-05-13T01:48:33Z
Modified
2023-11-01T04:48:34.550604Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Jenkins vSphere Plugin incorrect authorization vulnerability
Details

An improper authorization vulnerability exists in Jenkins vSphere Plugin 2.16 and older in Clone.java, CloudSelectorParameter.java, ConvertToTemplate.java, ConvertToVm.java, Delete.java, DeleteSnapshot.java, Deploy.java, ExposeGuestInfo.java, FolderVSphereCloudProperty.java, PowerOff.java, PowerOn.java, Reconfigure.java, Rename.java, RenameSnapshot.java, RevertToSnapshot.java, SuspendVm.java, TakeSnapshot.java, VSphereBuildStepContainer.java, vSphereCloudProvisionedSlave.java, vSphereCloudSlave.java, vSphereCloudSlaveTemplate.java, VSphereConnectionConfig.java, vSphereStep.java that allows attackers to perform form validation related actions, including sending numerous requests to the configured vSphere server, potentially resulting in denial of service, or send credentials stored in Jenkins with known ID to an attacker-specified server ("test connection"). As of version 2.17, these form validation methods require POST requests and appropriate user permissions.

Database specific
{
    "nvd_published_at": "2018-04-05T13:29:00Z",
    "github_reviewed_at": "2022-12-07T18:11:35Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-863"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins:vsphere-cloud

Package

Name
org.jenkins-ci.plugins:vsphere-cloud
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/vsphere-cloud

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.17

Database specific

{
    "last_known_affected_version_range": "<= 2.16"
}