Improper Input Validation Affecting org.continuousassurance.swamp.jenkins:swamp package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.1% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGCONTINUOUSASSURANCESWAMPJENKINS-3167270
  • published11 Dec 2022
  • disclosed16 Feb 2022
  • creditUnknown

Introduced: 16 Feb 2022

CVE-2022-25211  (opens in a new tab)
CWE-862  (opens in a new tab)

How to fix?

There is no fixed version for org.continuousassurance.swamp.jenkins:swamp.

Overview

org.continuousassurance.swamp.jenkins:swamp is a plugin that allows projects using Jenkins to perform static code assessments in the SWAMP as part of a build

Affected versions of this package are vulnerable to Improper Input Validation. The package does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVSS Scores

version 3.1