Description
Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.
Remediation
References
https://jenkins.io/security/advisory/2017-07-10/
http://www.securityfocus.com/bid/100435
Related Vulnerabilities
CVE-2021-21160 Vulnerability in npm package electron
CVE-2020-2209 Vulnerability in maven package org.jenkins-ci.plugins:testcomplete
CVE-2023-31417 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2022-2421 Vulnerability in maven package org.webjars.npm:socket.io-parser
CVE-2017-7957 Vulnerability in maven package org.jvnet.hudson:xstream