CSRF Vulnerability in Jenkins ElasTest Plugin by Jenkins
CVE-2020-2273
4.3MEDIUM
Summary
The Jenkins ElasTest Plugin prior to version 1.2.1 is susceptible to a cross-site request forgery (CSRF) attack. This vulnerability enables an unauthorized attacker to send requests on behalf of a legitimate user, leading to the potential connection to a malicious URL using specified attacker-provided credentials. Users are advised to upgrade to the latest version of the plugin to mitigate this risk.
Affected Version(s)
Jenkins ElasTest Plugin <= 1.2.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved