CVE-2020-2273: CSRF vulnerability in Jenkins ElasTest Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84771%
CWE
Published
5/24/2022
Updated
10/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:elastest | maven | <= 1.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The advisory explicitly states the vulnerability stems from a form validation method that lacks permission checks and doesn't enforce POST requests. In Jenkins plugins, form validation methods like doCheck* in Descriptor classes are common targets for CSRF when missing @RequirePOST. The method name 'doCheckUrl' is inferred from the credential/URL validation context described in the vulnerability. The high confidence comes from the direct match between the described vulnerability mechanics (missing permission check + CSRF via GET) and Jenkins plugin development patterns.