-
CVSS Score
-The vulnerability stems from form validation methods across multiple files that 1) didn't require POST requests (CSRF vector) and 2) lacked permission checks. The advisory explicitly lists affected files and describes the pattern of vulnerable form validation handlers. Jenkins plugin conventions use 'doTestConnection' for connection testing and 'doCheck*' methods for form validation. The high confidence comes from the direct correlation between described vulnerability mechanics and standard Jenkins plugin implementation patterns.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:vsphere-cloud | maven | <= 2.16 | 2.17 |