Medium severity6.3NVD Advisory· Published Oct 5, 2017· Updated May 13, 2026
CVE-2017-1000091
CVE-2017-1000091
Description
GitHub Branch Source Plugin connects to a user-specified GitHub API URL (e.g. GitHub Enterprise) as part of form validation and completion (e.g. to verify Scan Credentials are correct). This functionality improperly checked permissions, allowing any user with Overall/Read access to Jenkins to connect to any web server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:github-branch-sourceMaven | < 2.2.0-alpha-1 | 2.2.0-alpha-1 |
Affected products
39cpe:2.3:a:jenkins:github_branch_source:0.1:beta-1:*:*:*:jenkins:*:*+ 38 more
- cpe:2.3:a:jenkins:github_branch_source:0.1:beta-1:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:0.1:beta-2:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:0.1:beta-3:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:0.1:beta-4:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.0:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.10:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.1:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.2:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.3:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.4:beta-1:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.4:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.5:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.6:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.7:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.8.1:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.8:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:1.9:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.0:beta-1:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.0:beta-2:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.0:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-1:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-2:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-3:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-4:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-5:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-6:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.1:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.2:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.3:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.4:beta-1:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.4:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.5:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.6:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.0.7:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.2.0:alpha-1:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.2.0:alpha-2:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.2.0:alpha-3:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.2.0:alpha-4:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:github_branch_source:2.2.0:beta-1:*:*:*:jenkins:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-w66r-f5gg-gqwmghsaADVISORY
- jenkins.io/security/advisory/2017-07-10/nvdVendor Advisory
- nvd.nist.gov/vuln/detail/CVE-2017-1000091ghsaADVISORY
- jenkins.io/security/advisory/2017-07-10ghsaWEB
News mentions
0No linked articles in our index yet.