CSRF Vulnerability in Jenkins Azure AD Plugin by Jenkins
CVE-2021-21679
8.8HIGH
Summary
The Jenkins Azure AD Plugin prior to version 179.vf6841393099e is vulnerable to a Cross-Site Request Forgery (CSRF) attack. Malicious actors can exploit this vulnerability by crafting specific URLs that bypass CSRF protections for any target URL within Jenkins, potentially leading to unauthorized actions performed on behalf of authenticated users. It is essential for Jenkins administrators to upgrade to the latest version to mitigate this risk and ensure the security of their CI/CD pipeline.
Affected Version(s)
Jenkins Azure AD Plugin 164.v5b48baa961d2
Jenkins Azure AD Plugin <= 179.vf6841393099e
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved