Description
A missing permission check in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
Remediation
References
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3121
Related Vulnerabilities
CVE-2019-10358 Vulnerability in maven package org.jenkins-ci.main:maven-plugin
CVE-2010-1870 Vulnerability in maven package com.opensymphony:xwork-core
CVE-2023-42277 Vulnerability in maven package cn.hutool:hutool-core
CVE-2020-2302 Vulnerability in maven package org.jenkins-ci.plugins:active-directory
CVE-2018-1256 Vulnerability in maven package io.pivotal.spring.cloud:spring-cloud-sso-connector