Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02ZzU3LWgzOGMtcTUyZ84AAUF0
Cross-Site Request Forgery in Jenkins Mailer Plugin
Cross-site request forgery (CSRF) vulnerability in the Mailer Plugin 1.20 for Jenkins 2.111 allows remote authenticated users to send unauthorized mail as an arbitrary user via a /descriptorByName/hudson.tasks.Mailer/sendTestMail request.
Permalink: https://github.com/advisories/GHSA-6g57-h38c-q52gJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02ZzU3LWgzOGMtcTUyZ84AAUF0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 4 months ago
CVSS Score: 8.0
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-6g57-h38c-q52g, CVE-2018-8718
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-8718
- https://jenkins.io/security/advisory/2018-03-26/
- https://www.exploit-db.com/exploits/44843/
- http://www.openwall.com/lists/oss-security/2018/03/26/3
- http://www.securityfocus.com/bid/103691
- https://github.com/jenkinsci/mailer-plugin/commit/98e79cf904769907f83894e29f50ed6b3e7eb135
- https://github.com/advisories/GHSA-6g57-h38c-q52g
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:mailer
Affected Version Ranges: <= 1.20Fixed in: 1.21