Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-44243

Script management vulnerable to Cross-Site Request Forgery attacks

    • Icon: Bug Bug
    • Resolution: Fixed
    • Icon: Blocker Blocker
    • scriptler-plugin
    • None

       

      SECURITY-334
      None of the script management functionality in Scriptler requires POST access, and is therefore vulnerable to CSRF exploits even with CSRF protection enabled in the Jenkins global security configuration.

          [JENKINS-44243] Script management vulnerable to Cross-Site Request Forgery attacks

          imod thank you for working to close several of the issues:

          • -JENKINS-44242- Persistent cross-site scripting
          • -JENKINS-44243- Script management vulnerable to Cross-Site Request Forgery attacks
          • -JENKINS-44245- Scriptler Plugin allows any Scriptler script to be executed as build step

          Any idea when will these be released into a new version of Scriptler? I think a lot of people are excited to get a new version that clears the security concerns including us that support the Active-Choices plugin, a major benefactor of the Scriptler functionality. Best regards, Ioannis

          Ioannis Moutsatsos added a comment - imod thank you for working to close several of the issues: - JENKINS-44242 - Persistent cross-site scripting - JENKINS-44243 - Script management vulnerable to Cross-Site Request Forgery attacks - JENKINS-44245 - Scriptler Plugin allows any Scriptler script to be executed as build step Any idea when will these be released into a new version of Scriptler? I think a lot of people are excited to get a new version that clears the security concerns including us that support the Active-Choices plugin, a major benefactor of the Scriptler functionality. Best regards, Ioannis

            imod Dominik Bartholdi
            imod Dominik Bartholdi
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: