CVE-2019-10471: Jenkins Libvirt Slaves Plugin vlnerable to Cross-Site Request Forgery
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.27186%
CWE
Published
5/24/2022
Updated
12/26/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:libvirt-slave | maven | < 1.8.6 | 1.8.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing POST request enforcement in form validation endpoints. The GitHub patch adds 'checkMethod="post"' to Jelly UI components, which correlates to backend form handlers. Jenkins typically uses doCheck<FieldName>()
methods for form validation. The affected Jelly files (Hypervisor/config.jelly
and VirtualMachineSlave/configure-entries.jelly
) control hypervisor and slave configuration, and their pre-patch lack of POST checks made associated validation methods vulnerable to CSRF. The commit explicitly targets CSRF (CVE-2019-10471), confirming these endpoints were the attack surface.