Loading HuntDB...

GHSA-2c5c-fhr8-pwh9

GitHub Security Advisory

Jenkins AppSpider Plugin missing permission check

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins AppSpider Plugin 1.0.15 and earlier does not perform a permission check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.

Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

AppSpider Plugin 1.0.16 requires POST requests and Overall/Administer permission for the affected form validation method.

Affected Packages

Maven com.rapid7:jenkinsci-appspider-plugin
Affected versions: 0 (fixed in 1.0.16)

Related CVEs

Key Information

GHSA ID
GHSA-2c5c-fhr8-pwh9
Published
May 16, 2023 6:30 PM
Last Modified
June 2, 2023 10:03 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
com.rapid7:jenkinsci-appspider-plugin
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.