Loading HuntDB...

GHSA-6cvr-rvpm-9wx4

GitHub Security Advisory

Jenkins SCM HttpClient Plugin vulnerable to Cross-Site Request Forgery

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

SCM HttpClient Plugin 1.5 and earlier does not perform permission check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Affected Packages

Maven com.meowlomo.jenkins:scm-httpclient
Affected versions: 0 (last affected: 1.5)

Related CVEs

Key Information

GHSA ID
GHSA-6cvr-rvpm-9wx4
Published
September 22, 2022 12:00 AM
Last Modified
December 9, 2022 8:08 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
com.meowlomo.jenkins:scm-httpclient
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.