Cross-Site Request Forgery in Jenkins Warnings Plugin by CloudBees
CVE-2019-1003007

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
6 February 2019

Summary

A cross-site request forgery vulnerability in the Jenkins Warnings Plugin allows attackers to execute arbitrary code via a compromised form validation HTTP endpoint. This vulnerability affects versions 5.0.0 and earlier, posing a significant risk to users if not addressed. The exploitation of this vulnerability can lead to unauthorized actions being taken within the Jenkins environment, highlighting the importance of maintaining updated security practices.

Affected Version(s)

Jenkins Warnings Plugin 5.0.0 and earlier

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability Reserved

  • Vulnerability published

.