CVE-2021-21620: Cross-Site Request Forgery in the Jenkins Claim plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53512%
CWE
Published
6/16/2021
Updated
10/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:claim | maven | < 2.18.2 | 2.18.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from an HTTP endpoint handling claim assignments not requiring POST requests. Jenkins plugins typically implement form handlers via Stapler actions, where state-changing operations should use POST with CSRF protection. The advisory explicitly states the fix required POST enforcement, indicating the original handler lacked this protection. The most logical candidate is the claim assignment handler method in the core claim processing class, which would have been modified to add @RequirePOST annotation or similar protection in the patched version.