Loading HuntDB...

GHSA-933x-5g7r-773q

GitHub Security Advisory

CSRF vulnerability in Jenkins Security Inspector plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Security Inspector Plugin 117.v6eecc36919c2 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to replace the generated report stored in a per-session cache and displayed to authorized users at the `…​/report` URL with a report based on attacker-specified report generation options. This could create confusion in users of the plugin who are expecting to see a different result. A security hardening since Jenkins 2.287 and LTS 2.277.2 prevents exploitation of this vulnerability for the _Single user, multiple jobs_ report however, there is no fix at this time. Other report types are still affected.

Affected Packages

Maven org.jenkins-ci.plugins:security-inspector
Affected versions: 0 (last affected: 17.v6eecc36919c2)

Related CVEs

Key Information

GHSA ID
GHSA-933x-5g7r-773q
Published
September 22, 2022 12:00 AM
Last Modified
December 6, 2022 4:03 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:security-inspector
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.