Cross-Site Request Forgery in Jenkins Warnings Next Generation Plugin
CVE-2019-1003008
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 6 February 2019
Summary
A cross-site request forgery vulnerability exists in the Jenkins Warnings Next Generation Plugin, allowing attackers to exploit the form validation HTTP endpoint. This flaw can lead to unauthorized actions being performed on behalf of an authenticated user without their consent, potentially resulting in arbitrary code execution. Proper validation checks are essential to mitigate risks associated with this vulnerability.
Affected Version(s)
Jenkins Warnings Next Generation Plugin 2.1.1 and earlier
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability Reserved
Vulnerability published