Jenkins Git Plugin before version 3.9.2 has the following vulnerability: Git Plugin allows the creation of a tag in a job workspace’s Git repository with accompanying metadata attached to a build record. The HTTP endpoint to create the tag did not require POST requests, resulting in a CSRF vulnerability. The HTTP endpoint to create the tag now requires that requests are sent via POST. External Reference: https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1095 Upstream patches: https://github.com/jenkinsci/git-plugin/commit/f9152d943936b1c6b493dfe750d27f0caa7c0767 https://github.com/jenkinsci/git-plugin/pull/667 https://github.com/jenkinsci/git-plugin/pull/668
openshift-enterprise 3.2-3.11 inclusive: affected Once openshift3/jenkins-1-rhel7, openshift3/jenkins-2-rhel7, openshift3/jenkins-slave-base-rhel7 container images have been released with these fixes, users of all versions of openshift-enterprise-3.2+ are encouraged to update these container images in their environment.
Hi ProdSec, this one has been closed here: https://access.redhat.com/errata/RHSA-2020:2478 with: https://github.com/openshift/jenkins/commit/9f96d2ec7fd8ab352925260c9d65c627166963e9#diff-59ce6b9a64a53ca25571b8abe518c409R71 If more informations are needed, please feel free to re-open it.