logo

CVE-2021-21641 org.jenkins-ci.plugins:promoted-builds

Package

Manager: maven
Name: org.jenkins-ci.plugins:promoted-builds
Vulnerable Version: >=0 <3.9.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.02526 pctl0.8487

Details

CSRF vulnerability in Jenkins promoted builds Plugin Jenkins promoted builds Plugin 3.9 and earlier does not require POST requests for HTTP endpoints implementing promotion (regular, forced, and re-execute), resulting in cross-site request forgery (CSRF) vulnerabilities. These vulnerabilities allow attackers to promote builds. Jenkins promoted builds Plugin 3.9.1 requires POST requests for the affected HTTP endpoints. A security hardening since Jenkins 2.287 and LTS 2.277.2 prevents exploitation of this vulnerability.

Metadata

Created: 2022-05-24T17:46:47Z
Modified: 2023-10-27T14:01:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5cxw-8v65-76vf/GHSA-5cxw-8v65-76vf.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-5cxw-8v65-76vf
Finding: F007
Auto approve: 1