Loading HuntDB...

GHSA-9h9v-rfh6-jf3w

GitHub Security Advisory

Jenkins Team Concert Plugin cross-site request forgery vulnerability

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins Team Concert Plugin 1.3.0 and earlier does not perform permission checks on a method implementing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, the form validation method does not require POST requests, resulting in a CSRF vulnerability.

As of publication of this advisory, there is no fix.

Affected Packages

Maven org.jenkins-ci.plugins:teamconcert
Affected versions: 0 (last affected: 1.3.0)

Related CVEs

Key Information

GHSA ID
GHSA-9h9v-rfh6-jf3w
Published
May 24, 2022 5:03 PM
Last Modified
October 27, 2023 5:45 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:teamconcert
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.