
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site request forgery (CSRF) vulnerability was discovered in Jenkins XebiaLabs XL Deploy Plugin versions 10.0.1 and earlier. The vulnerability was disclosed on June 10, 2021, as part of a larger security advisory that included multiple vulnerabilities in Jenkins plugins (Jenkins Advisory).
The vulnerability stems from a form validation method that does not require POST requests in the XebiaLabs XL Deploy Plugin. This issue is part of a larger security concern (SECURITY-1982) that includes missing and incorrect permission checks. The severity is rated as High according to CVSS scoring (Jenkins Advisory).
The vulnerability allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, potentially leading to the capture of Username/password credentials stored in Jenkins (Jenkins Advisory, OSS Security).
The vulnerability was fixed in XebiaLabs XL Deploy Plugin version 10.0.2. The updated version requires POST requests and Overall/Administer permission for the affected form validation method. Users are advised to upgrade to this version to mitigate the vulnerability (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."