Bug 1418731 (CVE-2017-2613) - CVE-2017-2613 jenkins: User creation CSRF using GET by admins (SECURITY-406)
Summary: CVE-2017-2613 jenkins: User creation CSRF using GET by admins (SECURITY-406)
Status: NEW
Alias: CVE-2017-2613
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=moderate,public=20170201,repor...
Keywords: Security
Depends On: 1418736
Blocks: 1395176 1418735
TreeView+ depends on / blocked
Reported: 2017-02-02 15:18 UTC by Andrej Nemec
Modified: 2018-06-29 22:18 UTC (History)
13 users (show)

Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Andrej Nemec 2017-02-02 15:18:29 UTC
The following flaw was found in Jenkins:

When administrators accessed a URL like /user/example via HTTP GET, a user with the ID example was created if it did not exist. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records.

Accessing these URLs now no longer results in a user record getting created, Jenkins will respond with 404 Not Found if no such user exists. When using the internal Jenkins user database, new users can be created via Manage Jenkins ยป Manage Users. To restore the previous (unsafe) behavior, set the system property hudson.model.User.allowUserCreationViaUrl to true as described on Features controlled by system properties.

External References:


Upstream patch:


Comment 1 Andrej Nemec 2017-02-02 15:49:18 UTC
Created jenkins tracking bugs for this issue:

Affects: fedora-all [bug 1418736]

Note You need to log in before you can comment on or make changes to this bug.