Cross-Site Request Forgery in Jenkins Bitbucket Branch Source Plugin
High severity
GitHub Reviewed
Published
Jan 13, 2022
to the GitHub Advisory Database
•
Updated Dec 27, 2023
Package
Affected versions
>= 726.v7e6f53de133c, < 746.v350d2781c184
>= 720.vbe985dd73d66, < 725.vd9f8be0fa250
>= 2.9.8, < 2.9.11.2
< 2.9.7.2
Patched versions
746.v350d2781c184
725.vd9f8be0fa250
2.9.11.2
2.9.7.2
Description
Published by the National Vulnerability Database
Jan 12, 2022
Published to the GitHub Advisory Database
Jan 13, 2022
Reviewed
Jun 20, 2022
Last updated
Dec 27, 2023
Jenkins Bitbucket Branch Source Plugin prior to 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, and 2.9.7.2 does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Bitbucket Branch Source Plugin 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, and 2.9.7.2 requires POST requests for the affected HTTP endpoint.
References