Lucene search

K
osvGoogleOSV:GHSA-WHF8-3H58-2W9F
HistoryMay 13, 2022 - 1:31 a.m.

Jenkins Warnings Next Generation Plugin cross-site request forgery vulnerability

2022-05-1301:31:35
Google
osv.dev
8
jenkins
warnings
next generation
plugin
cross-site request forgery
vulnerability
http endpoint
groovy script
compilation
sandbox protection
overall/runscripts
permission
ast transforming annotations
@grab
source code
unsafe
compiler configuration
fix
request method
post.

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

41.5%

Jenkins Warnings Next Generation Plugin has a form validation HTTP endpoint used to validate a Groovy script through compilation, which was not subject to sandbox protection. The endpoint checked for the Overall/RunScripts permission, but did not require POST requests, so it was vulnerable to cross-site request forgery (CSRF). This allowed attackers to execute arbitrary code on the Jenkins controller by applying AST transforming annotations such as @Grab to source code elements.

The affected HTTP endpoint now applies a safe Groovy compiler configuration preventing the use of unsafe AST transforming annotations. Additionally, the form validation HTTP endpoint now requires that requests be sent via POST to prevent CSRF.

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

41.5%

Related for OSV:GHSA-WHF8-3H58-2W9F