Loading HuntDB...

GHSA-2pj6-5hqc-w5x9

GitHub Security Advisory

CSRF vulnerability in Jenkins SWAMP Plugin allows capturing credentials

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

WAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.\

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Affected Packages

Maven org.continuousassurance.swamp.jenkins:swamp
Affected versions: 0 (last affected: 1.2.6)

Related CVEs

Key Information

GHSA ID
GHSA-2pj6-5hqc-w5x9
Published
February 16, 2022 12:01 AM
Last Modified
December 1, 2022 10:06 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.continuousassurance.swamp.jenkins:swamp
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.