Loading HuntDB...

GHSA-qww5-p626-rfpf

GitHub Security Advisory

Jenkins JX Resources Plugin cross-site request forgery vulnerability

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins jx-resources Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified Kubernetes server and obtain information about an attacker-specified namespace. Doing so might also leak service account credentials used for the connection. Additionally, it allowed attackers to obtain the value of any attacker-specified environment variable for the Jenkins controller process.

Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.

This form validation method now requires POST requests and Overall/Administer permissions.

Affected Packages

Maven org.jenkins-ci.plugins:jx-resources
Affected versions: 0 (fixed in 1.0.37)

Related CVEs

Key Information

GHSA ID
GHSA-qww5-p626-rfpf
Published
May 24, 2022 4:47 PM
Last Modified
October 26, 2023 10:26 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:jx-resources
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.