-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.synopsys.integration:synopsys-detect | maven | < 1.4.1 | 1.4.1 |
The vulnerability stemmed from form validation methods in DetectPostBuildStepDescriptor.java that lacked both permission checks (requiring only Overall/Read access) and CSRF protections (allowing GET requests). The GitHub commit 0da415d explicitly adds @POST annotations and Jenkins.ADMINISTER permission checks to these methods, confirming they were the attack surface. Each listed function corresponds to a form validation endpoint modified in the patch, directly addressing the described vulnerability mechanisms (information exposure via unauthorized access and CSRF).