Cross-Site Request Forgery in Jenkins WebSphere Deployer Plugin
CVE-2019-16560
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 17 December 2019
Summary
The Jenkins WebSphere Deployer Plugin versions prior to 1.6.1 are vulnerable to a cross-site request forgery, allowing attackers to perform unauthorized actions. Specifically, the vulnerability permits attackers to conduct connection tests and ascertain the existence of files on the Jenkins master file system by specifying arbitrary paths. This could potentially lead to unauthorized access or information disclosure, hence it is crucial for users to update to the latest version to mitigate the risks.
Affected Version(s)
Jenkins WebSphere Deployer Plugin <= 1.6.1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved