GHSA-vrvm-459q-j824
GitHub Security Advisory
Jenkins Ansible Tower Plugin cross-site request forgery vulnerability
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Ansible Tower Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.
This form validation method now requires POST requests and Overall/Administer permissions.
Affected Packages
Maven
org.jenkins-ci.plugins:ansible-tower
Affected versions:
0
(fixed in 0.9.2)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: July 5, 2025 6:26 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.