Description
Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.
Remediation
References
https://jenkins.io/security/advisory/2017-07-10/
http://www.securityfocus.com/bid/100435
Related Vulnerabilities
CVE-2021-36373 Vulnerability in maven package org.apache.ant:ant
CVE-2022-34189 Vulnerability in maven package org.jenkins-ci.plugins:image-tag-parameter
CVE-2014-0109 Vulnerability in maven package org.apache.cxf:cxf-bundle-jaxrs
CVE-2023-24807 Vulnerability in npm package undici
CVE-2023-24057 Vulnerability in maven package ca.uhn.hapi.fhir:org.hl7.fhir.validation