Cross-Site Request Forgery in Jenkins RapidDeploy Plugin
CVE-2019-16570

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
17 December 2019

Summary

The Jenkins RapidDeploy Plugin version 4.1 and earlier is vulnerable to cross-site request forgery (CSRF). This security flaw enables attackers to exploit the plugin, allowing them to connect to a web server controlled by the attacker. By leveraging this vulnerability, unauthorized commands could be executed, compromising the integrity and security of the Jenkins instance. Users are highly encouraged to upgrade to the latest version to mitigate this risk.

Affected Version(s)

Jenkins RapidDeploy Plugin <= 4.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.