Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A cross-site request forgery vulnerability exists in Jenkins vSphere Plugin 2.16 and older in Clone.java, CloudSelectorParameter.java, ConvertToTemplate.java, ConvertToVm.java, Delete.java, DeleteSnapshot.java, Deploy.java, ExposeGuestInfo.java, FolderVSphereCloudProperty.java, PowerOff.java, PowerOn.java, Reconfigure.java, Rename.java, RenameSnapshot.java, RevertToSnapshot.java, SuspendVm.java, TakeSnapshot.java, VSphereBuildStepContainer.java, vSphereCloudProvisionedSlave.java, vSphereCloudSlave.java, vSphereCloudSlaveTemplate.java, VSphereConnectionConfig.java, vSphereStep.java that allows attackers to perform form validation related actions, including sending numerous requests to the configured vSphere server, potentially resulting in denial of service, or send credentials stored in Jenkins with known ID to an attacker-specified server ("test connection").
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
CloudBees Jenkins vSphere Plugin 跨站请求伪造漏洞
Vulnerability Description
CloudBees Jenkins是美国CloudBees公司的一套基于Java开发的持续集成工具,它主要用于监控持续的软件版本发布/测试项目和一些定时执行的任务。vSphere Plugin是使用其中的一个用于控制和使用托管在VMware vSphere服务器中虚拟机的插件。 CloudBees Jenkins vSphere Plugin 2.16及之前版本中的多个文件存在跨站请求伪造漏洞。攻击者可通过执行与表单验证相关的操作(包括向配置的vSphere服务器发送大量请求)利用该漏洞造成拒绝服务,或向
CVSS Information
N/A
Vulnerability Type
N/A