CVE-2020-2237: CSRF vulnerability in Jenkins Flaky Test Handler Plugin
4.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.63852%
CWE
Published
5/24/2022
Updated
1/29/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:flaky-test-handler | maven | < 1.1.0 | 1.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing HTTP POST requirement for state-changing actions. Jenkins plugins typically implement CSRF protection by restricting actions to POST requests and using crumb tokens. The advisory explicitly states the 'Deflake this build' feature lacked POST enforcement. While exact implementation details aren't available, the standard Jenkins plugin pattern would involve a handler method like doDeflake
in an Action class. The confidence is high because: 1) The vulnerability description directly implicates the rebuild functionality 2) Jenkins security patterns strongly correlate HTTP method validation with action handler methods 3) The 'Deflake' action is a clear state-changing operation requiring POST protection.