Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ydnd3LXc2Mm0taGNoOM4AAmC5
CSRF vulnerability in Jenkins Lockable Resources Plugin
Lockable Resources Plugin 2.8 and earlier does not require POST requests for several HTTP endpoints, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to reserve, unreserve, unlock, and reset resources. Lockable Resources Plugin 2.9 requires POST requests for the affected HTTP endpoints.
Permalink: https://github.com/advisories/GHSA-rvww-w62m-hch8JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ydnd3LXc2Mm0taGNoOM4AAmC5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 12 months ago
CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
EPSS Percentage: 0.00062
EPSS Percentile: 0.28512
Identifiers: GHSA-rvww-w62m-hch8, CVE-2020-2281
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2281
- https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1958
- http://www.openwall.com/lists/oss-security/2020/09/23/1
- https://github.com/jenkinsci/lockable-resources-plugin/commit/50ab82498f792775a761e6f4937607b240ecde67
- https://github.com/advisories/GHSA-rvww-w62m-hch8
Blast Radius: 1.0
Affected Packages
maven:org.6wind.jenkins:lockable-resources
Affected Version Ranges: < 2.9Fixed in: 2.9