Description
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/04/30/5
http://www.securityfocus.com/bid/108159
https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1355
Related Vulnerabilities
CVE-2023-34434 Vulnerability in maven package org.apache.inlong:manager-pojo
CVE-2019-16762 Vulnerability in npm package slpjs
CVE-2023-50771 Vulnerability in maven package org.jenkins-ci.plugins:oic-auth
CVE-2021-32738 Vulnerability in npm package stellar-sdk
CVE-2020-11619 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind