CSRF vulnerability in Jenkins Config File Provider Plugin allows deleting configuration files
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 19, 2023
Package
Affected versions
<= 3.7.0
Patched versions
3.7.1
Description
Published by the National Vulnerability Database
Apr 21, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 13, 2022
Last updated
Dec 19, 2023
Jenkins Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID.
This is due to an incomplete fix of SECURITY-938.
Jenkins Config File Provider Plugin 3.7.1 requires POST requests for the affected HTTP endpoint.
References