Description
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Remediation
References
https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1355
http://www.openwall.com/lists/oss-security/2019/04/30/5
http://www.securityfocus.com/bid/108159
Related Vulnerabilities
CVE-2023-46131 Vulnerability in maven package org.grails:grails-encoder
CVE-2022-39239 Vulnerability in npm package @netlify/ipx
CVE-2018-11804 Vulnerability in maven package org.apache.spark:spark-core_2.10
CVE-2011-2092 Vulnerability in maven package com.adobe.blazeds:flex-messaging-common
CVE-2023-24455 Vulnerability in maven package io.jenkins.plugins:visualexpert