Cross-Site Request Forgery in Jenkins Fortify on Demand Plugin by Jenkins
CVE-2020-2203

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
2 July 2020

Summary

A cross-site request forgery vulnerability exists in the Fortify on Demand Plugin for Jenkins. This vulnerability allows attackers to exploit the plugin by leveraging attacker-controlled credential IDs to connect to the globally configured Fortify on Demand endpoint. This could result in unauthorized actions being performed on behalf of an unsuspecting user. Proper measures should be implemented to secure the plugin and prevent such exploitations.

Affected Version(s)

Jenkins Fortify on Demand Plugin <= 5.0.1

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.