Description
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.
Remediation
References
https://jenkins.io/security/advisory/2017-07-10/
http://www.securityfocus.com/bid/99574
Related Vulnerabilities
CVE-2014-0109 Vulnerability in maven package org.apache.cxf:cxf-bundle-jaxrs
CVE-2018-1334 Vulnerability in maven package org.apache.spark:spark-core_2.10
CVE-2018-10054 Vulnerability in maven package com.datomic:datomic-free
CVE-2014-3600 Vulnerability in maven package org.apache.activemq:activemq-client