Cross-Site Request Forgery in Jenkins Kmap Plugin
CVE-2019-10292
6.5MEDIUM
Summary
The Kmap Plugin for Jenkins is vulnerable to a cross-site request forgery, allowing attackers to exploit the form validation methods in the KmapJenkinsBuilder.DescriptorImpl component. This vulnerability can lead to an attacker initiating connections to their specified server without proper authorization.
Affected Version(s)
Jenkins Kmap Plugin all versions as of 2019-04-03
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved