Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.plugins/pollscm
  4. ›
  5. CVE-2017-1000093

CVE-2017-1000093: Cross-Site Request Forgery (CSRF)

October 5, 2017 (updated October 17, 2017)

The Poll SCM Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to initiate polling of projects with a known name. While Jenkins in general does not consider polling to be a protection-worthy action as it’s similar to cache invalidation, the plugin specifically adds a permission to be able to use this functionality, and this issue undermines that permission.

References

  • jenkins.io/security/advisory/2017-07-10/
  • nvd.nist.gov/vuln/detail/CVE-2017-1000093

Code Behaviors & Features

Detect and mitigate CVE-2017-1000093 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.3.1

Solution

Unfortunately, there is no solution available yet.

Impact 8.8 HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

maven/org.jenkins-ci.plugins/pollscm/CVE-2017-1000093.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:07 +0000.