Description
Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.
Remediation
References
https://jenkins.io/security/advisory/2017-07-10/
Related Vulnerabilities
CVE-2012-2379 Vulnerability in maven package org.apache.cxf:cxf-bundle-minimal
CVE-2020-16014 Vulnerability in maven package org.webjars.npm:electron
CVE-2020-2232 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2019-10311 Vulnerability in maven package org.jenkins-ci.plugins:ansible-tower
CVE-2016-0779 Vulnerability in maven package org.apache.tomee:arquillian-tomee-common