CSRF vulnerability in Jenkins Security Inspector plugin
Moderate severity
GitHub Reviewed
Published
Sep 22, 2022
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Package
Affected versions
<= 17.v6eecc36919c2
Patched versions
None
Description
Published by the National Vulnerability Database
Sep 21, 2022
Published to the GitHub Advisory Database
Sep 22, 2022
Reviewed
Dec 6, 2022
Last updated
Jan 31, 2023
Security Inspector Plugin 117.v6eecc36919c2 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to replace the generated report stored in a per-session cache and displayed to authorized users at the
…/report
URL with a report based on attacker-specified report generation options. This could create confusion in users of the plugin who are expecting to see a different result. A security hardening since Jenkins 2.287 and LTS 2.277.2 prevents exploitation of this vulnerability for the Single user, multiple jobs report however, there is no fix at this time. Other report types are still affected.References