Cross-Site Request Forgery Vulnerability in Jenkins Alauda Kubernetes Support Plugin
CVE-2019-16575
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 17 December 2019
Summary
The Jenkins Alauda Kubernetes Support Plugin contains a cross-site request forgery vulnerability that allows attackers to exploit unsecured requests. By manipulating user sessions, attackers can connect to an arbitrary URL using unauthorized credentials obtained through various means. This can lead to unauthorized access to sensitive information such as Kubernetes service account tokens or other credentials stored in Jenkins, posing a significant security threat to affected systems.
Affected Version(s)
Jenkins Alauda Kubernetes Suport Plugin <= 2.3.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved