Description
Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.
Remediation
References
https://jenkins.io/security/advisory/2017-07-10/
Related Vulnerabilities
CVE-2014-3612 Vulnerability in maven package org.apache.activemq:activemq-all
CVE-2012-5633 Vulnerability in maven package org.apache.cxf:cxf-rt-core
CVE-2018-20677 Vulnerability in maven package org.webjars:bootstrap-sass
CVE-2017-1000403 Vulnerability in maven package org.jvnet.hudson.plugins:speaks
CVE-2022-28220 Vulnerability in maven package org.apache.james:james-server-protocols-imap4