Description
Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.
Remediation
References
https://jenkins.io/security/advisory/2017-07-10/
Related Vulnerabilities
CVE-2023-32988 Vulnerability in maven package org.jenkins-ci.plugins:azure-vm-agents
CVE-2023-49376 Vulnerability in maven package com.jfinal:jfinal
CVE-2012-0391 Vulnerability in maven package org.apache.struts.xwork:xwork-core
CVE-2018-8026 Vulnerability in maven package org.apache.solr:solr-core
CVE-2017-2651 Vulnerability in maven package org.jenkins-ci.plugins:mailer