Описание
Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.5.0 (включая)
cpe:2.3:a:jenkins:role-based_authorization_strategy:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 19%
0.00062
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-352
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
CSRF vulnerability in Jenkins Role-based Authorization Strategy Plugin configuration
EPSS
Процентиль: 19%
0.00062
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-352