Description
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.
Remediation
References
http://www.securityfocus.com/bid/99574
https://jenkins.io/security/advisory/2017-07-10/
Related Vulnerabilities
CVE-2018-1000864 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-39231 Vulnerability in maven package org.apache.ozone:ozone-main
CVE-2018-8006 Vulnerability in maven package org.apache.activemq:activemq-web-console
CVE-2020-5258 Vulnerability in maven package org.webjars.npm:dojo