VYPR
High severity8.8NVD Advisory· Published Oct 5, 2017· Updated May 13, 2026

CVE-2017-1000093

CVE-2017-1000093

Description

Poll SCM Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to initiate polling of projects with a known name. While Jenkins in general does not consider polling to be a protection-worthy action as it's similar to cache invalidation, the plugin specifically adds a permission to be able to use this functionality, and this issue undermines that permission.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:pollscmMaven
< 1.3.11.3.1

Affected products

1
  • cpe:2.3:a:jenkins:poll_scm:*:*:*:*:*:jenkins:*:*
    Range: <=1.3.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.