Cross-Site Request Forgery in Jenkins Docker Plugin by CloudBees
CVE-2019-10340
8.8HIGH
Summary
A cross-site request forgery (CSRF) vulnerability exists in the Jenkins Docker Plugin version 1.1.6 and prior, which allows users with Overall/Read access to initiate connections to an unauthorized URL. This attackers can exploit this by using compromised credential IDs, which might be obtained through other means, thereby potentially exposing sensitive Jenkins credentials that are stored within the system. Proper access controls and mitigations should be implemented to protect against such vulnerabilities.
Affected Version(s)
Jenkins Docker Plugin 1.1.6 and earlier
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved