A missing permission check in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3121 | vendor advisory |