Cross-Site Request Forgery in Jenkins Netsparker Cloud Scan Plugin
CVE-2019-10289
6.5MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 4 April 2019
What is CVE-2019-10289?
A cross-site request forgery vulnerability exists in the Jenkins Netsparker Cloud Scan Plugin, specifically in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method. This flaw allows attackers to forge requests that can initiate connections to arbitrary servers, potentially compromising the integrity and security of the Jenkins environment.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved