CVE-2021-21644 – org.jenkins-ci.plugins:config-file-provider
Package
Manager: maven
Name: org.jenkins-ci.plugins:config-file-provider
Vulnerable Version: >=0 <3.7.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00071 pctl0.22187
Details
CSRF vulnerability in Jenkins Config File Provider Plugin allows deleting configuration files Jenkins Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID. This is due to an incomplete fix of [SECURITY-938](https://www.jenkins.io/security/advisory/2018-09-25/#SECURITY-938). Jenkins Config File Provider Plugin 3.7.1 requires POST requests for the affected HTTP endpoint.
Metadata
Created: 2022-05-24T17:48:05Z
Modified: 2023-10-27T14:22:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-998m-f2x3-jjq4/GHSA-998m-f2x3-jjq4.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-998m-f2x3-jjq4
Finding: F007
Auto approve: 1