A form validation method in GitHub Branch Source Plugin did not check the permission of the user accessing them, allowing anyone with Overall/Read access to Jenkins to cause Jenkins to send a GET request to a specified URL. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnerability. External References: https://jenkins.io/security/advisory/2018-06-04/
Updating openshift-enterprise-3 to notaffected as this jenkins plugin github-branch-source in OCP 3.11 has been rebased to 2.3.6
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-1000185