logo

CVE-2021-21644 org.jenkins-ci.plugins:config-file-provider

Package

Manager: maven
Name: org.jenkins-ci.plugins:config-file-provider
Vulnerable Version: >=0 <3.7.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00071 pctl0.22187

Details

CSRF vulnerability in Jenkins Config File Provider Plugin allows deleting configuration files Jenkins Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID. This is due to an incomplete fix of [SECURITY-938](https://www.jenkins.io/security/advisory/2018-09-25/#SECURITY-938). Jenkins Config File Provider Plugin 3.7.1 requires POST requests for the affected HTTP endpoint.

Metadata

Created: 2022-05-24T17:48:05Z
Modified: 2023-10-27T14:22:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-998m-f2x3-jjq4/GHSA-998m-f2x3-jjq4.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-998m-f2x3-jjq4
Finding: F007
Auto approve: 1