Cross-Site Request Forgery in Jenkins Warnings NG Plugin by Jenkins
CVE-2019-10326

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
31 May 2019

Summary

A cross-site request forgery vulnerability in the Warnings NG Plugin for Jenkins allows attackers to manipulate warning counts for future builds, potentially disrupting the build process and creating confusion over the actual state of projects. This flaw affects version 5.0.0 and earlier, enabling unauthorized actions without user consent, which can compromise the integrity of development workflows.

Affected Version(s)

Jenkins Warnings NG Plugin 5.0.0 and earlier

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.