-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:websphere-deployer | maven | <= 1.6.1 |
The advisory explicitly identifies missing permission checks in form validation methods as the root cause. Jenkins plugin patterns indicate these validations are typically handled via doCheck*/doTest* methods in DescriptorImpl classes. The lack of POST requirement (CSRF) and absence of checkPermission()/hasPermission() calls aligns with the described attack vectors (file existence checks, config manipulation). While no exact code is shown, the plugin's functionality and Jenkins' architectural patterns strongly support this mapping.