Loading HuntDB...

GHSA-j365-62px-vjjv

GitHub Security Advisory

Jenkins GitLab Plugin Cross-Site Request Forgery vulnerability

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins GitLab Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.

This form validation method now requires POST requests and Overall/Administer permissions.

Affected Packages

Maven org.jenkins-ci.plugins:gitlab-plugin
Affected versions: 0 (fixed in 1.5.12)

Related CVEs

Key Information

GHSA ID
GHSA-j365-62px-vjjv
Published
May 24, 2022 4:43 PM
Last Modified
October 26, 2023 9:49 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:gitlab-plugin
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.