CSRF Vulnerability in Jenkins Azure AD Plugin by Jenkins
CVE-2021-21679

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
31 August 2021

Summary

The Jenkins Azure AD Plugin prior to version 179.vf6841393099e is vulnerable to a Cross-Site Request Forgery (CSRF) attack. Malicious actors can exploit this vulnerability by crafting specific URLs that bypass CSRF protections for any target URL within Jenkins, potentially leading to unauthorized actions performed on behalf of authenticated users. It is essential for Jenkins administrators to upgrade to the latest version to mitigate this risk and ensure the security of their CI/CD pipeline.

Affected Version(s)

Jenkins Azure AD Plugin 164.v5b48baa961d2

Jenkins Azure AD Plugin <= 179.vf6841393099e

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.