Jenkins CAS Plugin Server-Side Request Forgery vulnerability
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Dec 6, 2023
Description
Published by the National Vulnerability Database
Jun 5, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Dec 12, 2022
Last updated
Dec 6, 2023
A server-side request forgery vulnerability exists in Jenkins CAS Plugin 1.4.1 and older in CasSecurityRealm.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnerability. As of version 1.4.2, this form validation method requires POST requests and the Overall/Administer permission.
References