Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02MmZwLWo3NXEtbXFoY84AAiYs
Jenkins CRX Content Package Deployer Plugin subject to Cross-Site Request Forgery
A cross-site request forgery vulnerability in Jenkins CRX Content Package Deployer Plugin prior to 1.9 allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. This issue is patched in version 1.9
Permalink: https://github.com/advisories/GHSA-62fp-j75q-mqhcJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02MmZwLWo3NXEtbXFoY84AAiYs
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 1 year ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-62fp-j75q-mqhc, CVE-2019-10437
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10437
- https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1006%20(1)
- https://github.com/jenkinsci/crx-content-package-deployer-plugin/commit/1313c422170a064dab0f9359324ff27e30a9f4a5
- https://github.com/advisories/GHSA-62fp-j75q-mqhc
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:crx-content-package-deployer
Affected Version Ranges: < 1.9Fixed in: 1.9