Cross-Site Request Forgery in Jenkins Static Analysis Utilities Plugin
CVE-2019-10307
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 30 April 2019
Summary
A Cross-Site Request Forgery vulnerability exists in the Jenkins Static Analysis Utilities Plugin, specifically within the DefaultGraphConfigurationView#doSave method. This security flaw allows attackers to manipulate the default graph configuration settings for all users associated with a particular job, potentially leading to unauthorized changes in project configurations without user consent. It is crucial for Jenkins administrators to apply the necessary updates to mitigate this risk and protect their CI/CD environments.
Affected Version(s)
Jenkins Static Analysis Utilities Plugin 1.95 and earlier
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved