CVE-2024-28158: Jenkins Subversion Partial Release Manager Plugin vulnerable to Cross-Site Request Forgery
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.1894%
CWE
Published
3/6/2024
Updated
5/2/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:svn-partial-release-mgr | maven | <= 1.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The advisory explicitly states two key vulnerabilities in the HTTP endpoint: 1) Missing permission check (CVE-2024-28159) allowing Item/Read users to trigger builds, and 2) CSRF vulnerability (CVE-2024-28158) due to accepting GET requests. In Jenkins plugin architecture, HTTP endpoints handling build triggers typically use methods named like doBuildTrigger in Action classes. The combination of missing @RequirePOST annotation and lack of permission validation in this handler would make it vulnerable. While exact implementation details aren't available, this pattern matches Jenkins' vulnerability patterns for CSRF and matches the described attack vector.