-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the doCheckKey method handling sensitive SSH connection validation without proper security controls. The patch moved this logic to FormUtils.verifyHostKey while adding: 1) POST method requirement via @POST annotation 2) Jenkins.ADMINISTER permission check 3) CSRF protection through Stapler form validation patterns. The original implementation lacked these protections, making it vulnerable to CSRF attacks that could abuse the credential validation mechanism.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| fr.edf.jenkins.plugins:mac | maven | < 1.2.0 | 1.2.0 |
Ongoing coverage of React2Shell