CVE-2017-1000090

Severity
8.8HIGH
EPSS
0.1%
top 80.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 5
Latest updateMay 17

Description

Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
CSRF vulnerability in Jenkins Role-based Authorization Strategy Plugin configuration2022-05-17
OSV
CSRF vulnerability in Jenkins Role-based Authorization Strategy Plugin configuration2022-05-17
CVEList
CVE-2017-1000090: Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery2017-10-04

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2017-07-102017-07-10
CVE-2017-1000090 (HIGH CVSS 8.8) | Role-based Authorization Strategy P | cvebase.io