Loading HuntDB...

GHSA-c9qp-6556-jwwp

GitHub Security Advisory

Jenkins LDAP Plugin vulnerable to Cross-Site Request Forgery

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins LDAP Plugin 673.v034ec70ec2b_b_ and earlier does not require POST requests for a form validation method, resulting in a cross-site request forgery (CSRF) vulnerability.

This vulnerability allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.

LDAP Plugin 676.vfa_64cf6b_b_002 requires POST requests for the affected form validation method.

Affected Packages

Maven org.jenkins-ci.plugins:ldap
Affected versions: 0 (fixed in 676.vfa)

Related CVEs

Key Information

GHSA ID
GHSA-c9qp-6556-jwwp
Published
May 16, 2023 6:30 PM
Last Modified
May 17, 2023 2:56 AM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:ldap
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.