Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier does not perform a permission check in a connection test HTTP endpoint. This allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password. Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
NeuVector Vulnerability Scanner Plugin 2.2 requires POST requests and Overall/Administer permission for the affected HTTP endpoint.
{
"github_reviewed_at": "2023-11-29T21:31:59Z",
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-352"
],
"nvd_published_at": "2023-11-29T14:15:07Z"
}