← Back to CVEs
CVE-2019-16550
HIGH8.8
Description
A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published12/17/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
jenkins:maven
Weaknesses (CWE)
CWE-352
References
http://www.openwall.com/lists/oss-security/2019/12/17/1(jenkinsci-cert@googlegroups.com)
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2019/12/17/1(af854a3a-2127-422b-91ae-364da2661108)
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.