Skip to content

CSRF vulnerability in Jenkins Security Inspector plugin

Moderate severity GitHub Reviewed Published Sep 22, 2022 to the GitHub Advisory Database • Updated Jan 31, 2023

Package

maven org.jenkins-ci.plugins:security-inspector (Maven)

Affected versions

<= 17.v6eecc36919c2

Patched versions

None

Description

Security Inspector Plugin 117.v6eecc36919c2 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to replace the generated report stored in a per-session cache and displayed to authorized users at the …​/report URL with a report based on attacker-specified report generation options. This could create confusion in users of the plugin who are expecting to see a different result. A security hardening since Jenkins 2.287 and LTS 2.277.2 prevents exploitation of this vulnerability for the Single user, multiple jobs report however, there is no fix at this time. Other report types are still affected.

References

Published by the National Vulnerability Database Sep 21, 2022
Published to the GitHub Advisory Database Sep 22, 2022
Reviewed Dec 6, 2022
Last updated Jan 31, 2023

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Weaknesses

CVE ID

CVE-2022-41236

GHSA ID

GHSA-933x-5g7r-773q

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.