-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.cloudtp.jenkins:paaslane-estimate | maven | <= 1.0.4 |
The vulnerability stems from: 1) Missing permission checks in HTTP endpoints (CWE-352) allowing attackers with Overall/Read access to trigger actions, and 2) Lack of POST request requirements enabling CSRF. Jenkins plugin patterns indicate form validation (doVerify*) and connection test (doTest*) endpoints are common CSRF vectors when unsecured. The functions are inferred based on standard Jenkins plugin architecture and the advisory's description of 'several HTTP endpoints' allowing URL/token manipulation.
A Semantic Attack on Google Gemini - Read the Latest Research