Server-side Request Forgery (SSRF) Affecting com.acunetix:acunetix Open this link in a new tab package, versions [,1.1.0)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
26 Jun 2019
19 Feb 2019
Introduced: 19 Feb 2019CWE-918 Open this link in a new tab
How to fix?
com.acunetix:acunetix to version 1.1.0 or higher.
com.acunetix:acunetix package that allows you to trigger automated Acunetix scans as part of your web application’s build process inside of Jenkins.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). A missing permission check in a form validation method in Acunetix Plugin allowed users with Overall/Read permission to initiate a connection test, sending an HTTP GET request to an attacker-specified URL, adding a /me suffix, returning whether the connection could be established and whether the HTTP response code is 200.