Jenkins Crowd 2 Integration Plugin server-side request forgery vulnerability
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jan 9, 2024
Description
Published by the National Vulnerability Database
Jan 9, 2019
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jan 9, 2024
Last updated
Jan 9, 2024
An improper authorization vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java that allows attackers to have Jenkins perform a connection test, connecting to an attacker-specified server with attacker-specified credentials and connection settings.
References