Description
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.
Remediation
References
http://www.securityfocus.com/bid/99574
https://jenkins.io/security/advisory/2017-07-10/
Related Vulnerabilities
CVE-2022-43418 Vulnerability in maven package org.jenkins-ci.plugins:katalon
CVE-2021-44906 Vulnerability in maven package org.webjars.bowergithub.substack:minimist
CVE-2022-43404 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2017-18197 Vulnerability in maven package org.webjars.bower:mxgraph
CVE-2019-10294 Vulnerability in maven package org.jenkins-ci.plugins:kmap-jenkins