{"id":"GHSA-c8ff-j5gm-6492","summary":"Jenkins Report Portal Plugin Cross-Site Request Forgery vulnerability","details":"Jenkins Report Portal Plugin 0.5 and earlier does not perform a permission check in a method implementing form validation.\n\nThis allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.","aliases":["CVE-2023-30525"],"modified":"2023-11-01T05:01:54.495470Z","published":"2023-04-12T18:30:36Z","database_specific":{"nvd_published_at":"2023-04-12T18:15:00Z","severity":"MODERATE","github_reviewed":true,"cwe_ids":["CWE-352"],"github_reviewed_at":"2023-04-12T22:18:35Z"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30525"},{"type":"WEB","url":"https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2950"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2023/04/13/3"}],"affected":[{"package":{"name":"org.jenkins-ci.plugins:reportportal","ecosystem":"Maven","purl":"pkg:maven/org.jenkins-ci.plugins/reportportal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"0.5"}]}],"versions":["0.2","0.3","0.4","0.5"],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-c8ff-j5gm-6492/GHSA-c8ff-j5gm-6492.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}