Loading HuntDB...

GHSA-c2hg-2jj6-h8vh

GitHub Security Advisory

CSRF vulnerability in Jenkins Pipeline Maven Integration Plugin allow capturing credentials

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Pipeline Maven Integration Plugin 3.8.2 and earlier does not perform a permission check in a method implementing form validation.

This allows users with Overall/Read access to Jenkins to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.

Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Pipeline Maven Integration Plugin 3.8.3 requires POST requests and Job/Configure permission for the affected form validation method.

Affected Packages

Maven org.jenkins-ci.plugins:pipeline-maven
Affected versions: 0 (fixed in 3.8.3)

Related CVEs

Key Information

GHSA ID
GHSA-c2hg-2jj6-h8vh
Published
May 24, 2022 5:25 PM
Last Modified
December 20, 2022 9:29 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:pipeline-maven
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 2, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.