← Volver a CVEs
CVE-2019-16550
HIGH8.8
Descripcion
A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado12/17/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
jenkins:maven
Debilidades (CWE)
CWE-352
Referencias
http://www.openwall.com/lists/oss-security/2019/12/17/1(jenkinsci-cert@googlegroups.com)
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2019/12/17/1(af854a3a-2127-422b-91ae-364da2661108)
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.