Loading HuntDB...

GHSA-wvgr-5wgr-c6fj

GitHub Security Advisory

Jenkins mabl Plugin vulnerable to cross-site request forgery

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins mabl Plugin 0.0.46 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

mabl Plugin 0.0.47 requires POST requests and the appropriate permissions for the affected HTTP endpoints.

Affected Packages

Maven com.mabl.integration.jenkins:mabl-integration
Affected versions: 0 (fixed in 0.0.47)

Related CVEs

Key Information

GHSA ID
GHSA-wvgr-5wgr-c6fj
Published
July 12, 2023 6:30 PM
Last Modified
July 20, 2023 2:49 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
com.mabl.integration.jenkins:mabl-integration
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.