Loading HuntDB...

GHSA-998m-f2x3-jjq4

GitHub Security Advisory

CSRF vulnerability in Jenkins Config File Provider Plugin allows deleting configuration files

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.

This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID.

This is due to an incomplete fix of [SECURITY-938](https://www.jenkins.io/security/advisory/2018-09-25/#SECURITY-938).

Jenkins Config File Provider Plugin 3.7.1 requires POST requests for the affected HTTP endpoint.

Affected Packages

Maven org.jenkins-ci.plugins:config-file-provider
Affected versions: 0 (fixed in 3.7.1)

Related CVEs

Key Information

GHSA ID
GHSA-998m-f2x3-jjq4
Published
May 24, 2022 5:48 PM
Last Modified
October 27, 2023 2:22 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:config-file-provider
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.