Cross-Site Request Forgery Vulnerability in Jenkins MongoDB Plugin
CVE-2020-2268
8.8HIGH
Summary
A cross-site request forgery vulnerability in the Jenkins MongoDB Plugin, present in version 1.3 and earlier, allows attackers to exploit the Jenkins controller. By leveraging this CSRF flaw, threats can be executed that grant unauthorized access to sensitive metadata of any arbitrary files managed by Jenkins. This exposes the system to potential data leakage and unauthorized actions, making it imperative for users to apply relevant security updates.
Affected Version(s)
Jenkins MongoDB Plugin <= 1.3
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved