{"id":"GHSA-vjf8-xw6c-wjhq","summary":"CSRF vulnerability in Jenkins Flaky Test Handler Plugin","details":"Flaky Test Handler Plugin 1.0.4 and earlier does not require POST requests for the \"Deflake this build\" feature, resulting in a cross-site request forgery (CSRF) vulnerability.\n\nThis vulnerability allows attackers to rebuild a project at a previous git revision where the tests were failing.","aliases":["CVE-2020-2237"],"modified":"2023-11-01T04:52:26.974988Z","published":"2022-05-24T17:25:25Z","database_specific":{"nvd_published_at":"2020-08-12T14:15:00Z","severity":"MODERATE","github_reviewed_at":"2022-12-20T22:14:19Z","github_reviewed":true,"cwe_ids":["CWE-352"]},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2237"},{"type":"PACKAGE","url":"https://github.com/jenkinsci/flaky-test-handler-plugin"},{"type":"WEB","url":"https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1763"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/08/12/4"}],"affected":[{"package":{"name":"org.jenkins-ci.plugins:flaky-test-handler","ecosystem":"Maven","purl":"pkg:maven/org.jenkins-ci.plugins/flaky-test-handler"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.0"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vjf8-xw6c-wjhq/GHSA-vjf8-xw6c-wjhq.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}]}