Cross-Site Request Forgery in Jenkins CVS Plugin by Jenkins
CVE-2020-2184
4.3MEDIUM
Summary
A cross-site request forgery vulnerability exists in the Jenkins CVS Plugin, affecting versions 2.15 and earlier. This flaw enables attackers to create and manipulate tags within the plugin, potentially leading to unauthorized actions. Furthermore, attackers can connect to an arbitrary URL specified by them, posing a significant security risk. Users are strongly advised to update to the latest plugin version to mitigate this vulnerability.
Affected Version(s)
Jenkins CVS Plugin <= 2.15
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved