Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://jenkins.io/security/advisory/2017-07-10/ |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2017-10-04T01:00:00
Updated: 2024-08-05T21:53:06.639Z
Reserved: 2017-07-13T00:00:00
Link: CVE-2017-1000090
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-10-05T01:29:03.697
Modified: 2024-11-21T03:04:08.147
Link: CVE-2017-1000090
Redhat
No data.