Jenkins Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID.
This is due to an incomplete fix of SECURITY-938.
Jenkins Config File Provider Plugin 3.7.1 requires POST requests for the affected HTTP endpoint.
{
"nvd_published_at": "2021-04-21T15:15:00Z",
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-352"
],
"github_reviewed_at": "2022-12-13T19:26:33Z"
}