logo

CVE-2021-21629 org.jenkins-ci.plugins:build-with-parameters

Package

Manager: maven
Name: org.jenkins-ci.plugins:build-with-parameters
Vulnerable Version: >=0 <1.5.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00074 pctl0.23033

Details

CSRF vulnerability in Jenkins Build With Parameters Plugin Jenkins Build With Parameters Plugin 1.5 and earlier does not require POST requests for its form submission endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to build a project with attacker-specified parameters. Build With Parameters Plugin 1.5.1 requires POST requests for the affected HTTP endpoint.

Metadata

Created: 2022-05-24T17:45:44Z
Modified: 2023-10-27T14:04:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w24g-24qg-v4w2/GHSA-w24g-24qg-v4w2.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-w24g-24qg-v4w2
Finding: F007
Auto approve: 1