-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:subversion | maven | < 2.9 | 2.9 |
The vulnerability stems from form validation endpoints in the Subversion Plugin that: 1) Used GET instead of POST (enabling CSRF), and 2) Only checked Item/Build permission instead of Item/Configure. Jenkins plugin patterns indicate form validation methods like doCheck* in the DescriptorImpl class handle these operations. The CVE description explicitly mentions these flaws were fixed by adding POST requirements and proper permission checks in version 2.9, strongly implicating these credential/repository validation methods.