Cross-Site Request Forgery Vulnerability in Jenkins MongoDB Plugin
CVE-2020-2268

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
16 September 2020

Summary

A cross-site request forgery vulnerability in the Jenkins MongoDB Plugin, present in version 1.3 and earlier, allows attackers to exploit the Jenkins controller. By leveraging this CSRF flaw, threats can be executed that grant unauthorized access to sensitive metadata of any arbitrary files managed by Jenkins. This exposes the system to potential data leakage and unauthorized actions, making it imperative for users to apply relevant security updates.

Affected Version(s)

Jenkins MongoDB Plugin <= 1.3

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.