Cross-Site Request Forgery in Jenkins Audit to Database Plugin
CVE-2019-1003076

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
4 April 2019

Summary

A vulnerability in the Jenkins Audit to Database Plugin allows attackers to exploit the DbAuditPublisherDescriptorImpl#doTestJdbcConnection form validation method. By crafting a malicious request, an attacker can initiate a connection to an arbitrary server of their choosing, potentially leading to unauthorized data access and manipulation. It is essential to implement appropriate measures to mitigate this exposure.

Affected Version(s)

Jenkins Audit to Database Plugin all versions as of 2019-04-03

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.