Cross-Site Request Forgery in Jenkins Config File Provider Plugin
CVE-2018-1000414
8.1HIGH
Summary
A cross-site request forgery vulnerability in the Jenkins Config File Provider Plugin allows an attacker to create and modify configuration file definitions. This occurs due to insufficient validation in the handling of requests, potentially leading to unauthorized changes to critical configuration settings within Jenkins instances. Users are advised to update to the latest version of the plugin to mitigate associated risks.
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved