Cross-Site Request Forgery Vulnerability in Jenkins Report Portal Plugin
CVE-2023-30525
8.8HIGH
Summary
A CSRF vulnerability exists in the Jenkins Report Portal Plugin, version 0.5 and earlier, allowing attackers to manipulate user requests to connect to an attacker-specified URL. This vulnerability permits the use of a bearer token authentication method specified by the attacker, which could lead to unauthorized actions being performed on behalf of a user without their consent. Users of the affected plugin should be aware of this security risk and apply necessary mitigations as detailed in the Jenkins security advisory.
Affected Version(s)
Jenkins Report Portal Plugin 0 <= 0.5
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved