Description
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.
Remediation
References
http://www.securityfocus.com/bid/99574
https://jenkins.io/security/advisory/2017-07-10/
Related Vulnerabilities
CVE-2015-9235 Vulnerability in npm package jsonwebtoken
CVE-2016-1000232 Vulnerability in npm package tough-cookie
CVE-2021-26540 Vulnerability in maven package org.webjars.npm:sanitize-html
CVE-2019-16775 Vulnerability in npm package npm
CVE-2023-29922 Vulnerability in maven package tech.powerjob:powerjob