A cross-site request forgery vulnerability exists in Jenkins vSphere Plugin 2.16 and older in Clone.java, CloudSelectorParameter.java, ConvertToTemplate.java, ConvertToVm.java, Delete.java, DeleteSnapshot.java, Deploy.java, ExposeGuestInfo.java, FolderVSphereCloudProperty.java, PowerOff.java, PowerOn.java, Reconfigure.java, Rename.java, RenameSnapshot.java, RevertToSnapshot.java, SuspendVm.java, TakeSnapshot.java, VSphereBuildStepContainer.java, vSphereCloudProvisionedSlave.java, vSphereCloudSlave.java, vSphereCloudSlaveTemplate.java, VSphereConnectionConfig.java, vSphereStep.java that allows attackers to perform form validation related actions, including sending numerous requests to the configured vSphere server, potentially resulting in denial of service, or send credentials stored in Jenkins with known ID to an attacker-specified server ("test connection").
Publish Date : 2018-04-05 Last Update Date : 2018-05-15
-
CVSS Scores & Vulnerability Types
CVSS Score |
6.8 |
Confidentiality Impact |
Partial
(There is considerable informational disclosure.) |
Integrity Impact |
Partial
(Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.) |
Availability Impact |
Partial
(There is reduced performance or interruptions in resource availability.) |
Access Complexity |
Medium
(The access conditions are somewhat specialized. Some preconditions must be satistified to exploit) |
Authentication |
Not required
(Authentication is not required to exploit the vulnerability.) |
Gained Access |
None |
Vulnerability Type(s) |
Denial Of ServiceCSRF |
CWE ID |
352 |
|
|
-
Products Affected By CVE-2018-1000153
-
Number Of Affected Versions By Product
-
References For CVE-2018-1000153
|
|