Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2934 Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.
Github GHSA Github GHSA GHSA-774g-r3fm-4v85 CSRF vulnerability in Jenkins Role-based Authorization Strategy Plugin configuration
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T21:53:06.639Z

Reserved: 2017-07-13T00:00:00

Link: CVE-2017-1000090

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-10-05T01:29:03.697

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-1000090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.