Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1ydnd3LXc2Mm0taGNoOM4AAmC5

CSRF vulnerability in Jenkins Lockable Resources Plugin

Lockable Resources Plugin 2.8 and earlier does not require POST requests for several HTTP endpoints, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to reserve, unreserve, unlock, and reset resources. Lockable Resources Plugin 2.9 requires POST requests for the affected HTTP endpoints.

Permalink: https://github.com/advisories/GHSA-rvww-w62m-hch8
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ydnd3LXc2Mm0taGNoOM4AAmC5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 12 months ago


CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

EPSS Percentage: 0.00062
EPSS Percentile: 0.28512

Identifiers: GHSA-rvww-w62m-hch8, CVE-2020-2281
References: Repository: https://github.com/jenkinsci/lockable-resources-plugin
Blast Radius: 1.0

Affected Packages

maven:org.6wind.jenkins:lockable-resources
Affected Version Ranges: < 2.9
Fixed in: 2.9