Description
A missing permission check in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Remediation
References
http://www.securityfocus.com/bid/108045
https://jenkins.io/security/advisory/2019-04-17/#SECURITY-1357
Related Vulnerabilities
CVE-2017-1000048 Vulnerability in maven package org.webjars.bower:qs
CVE-2019-1003029 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2020-2278 Vulnerability in maven package org.jenkins-ci.plugins:storable-configs-plugin
CVE-2021-33562 Vulnerability in maven package com.shopizer:shopizer