← Zuruck zu CVEs
CVE-2019-16550
HIGH8.8
Beschreibung
A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht12/17/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
jenkins:maven
Schwachen (CWE)
CWE-352
Referenzen
http://www.openwall.com/lists/oss-security/2019/12/17/1(jenkinsci-cert@googlegroups.com)
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2019/12/17/1(af854a3a-2127-422b-91ae-364da2661108)
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.