Cross-site Request Forgery (CSRF) Affecting org.jenkins-ci.plugins:pipeline-githubnotify-step package, versions [,1.0.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-548793
  • published14 Feb 2020
  • disclosed12 Feb 2020
  • creditThomas de Grenier de Latour

Introduced: 12 Feb 2020

CVE-2020-2116  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade org.jenkins-ci.plugins:pipeline-githubnotify-step to version 1.0.5 or higher.

Overview

org.jenkins-ci.plugins:pipeline-githubnotify-step is a plugin that provides a GitHub status notification step.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) as it does not perform permission checks on a method implementing form validation.This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, the form validation method does not require POST requests, resulting in a CSRF vulnerability.

This form validation method requires POST requests and Item/Configure permissions

NOTE: This vulnerability has also been identified as: CVE-2020-2117

CVSS Scores

version 3.1