Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yNHJ2LWNxNzctNnAyNM4AAhfk
Jenkins Maven Release Plugin contains Cross-Site Request Forgery vulnerability
A cross-site request forgery vulnerability in Jenkins Maven Release Plugin prior to 0.15.0 in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options.
Permalink: https://github.com/advisories/GHSA-r4rv-cq77-6p24JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yNHJ2LWNxNzctNnAyNM4AAhfk
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 11 months ago
CVSS Score: 6.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Identifiers: GHSA-r4rv-cq77-6p24, CVE-2019-10359
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10359
- https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098
- http://www.openwall.com/lists/oss-security/2019/07/31/1
- https://github.com/jenkinsci/m2release-plugin/commit/2f1117d011e1ef200f28bbb0c24bf918b89704b6
- https://github.com/advisories/GHSA-r4rv-cq77-6p24
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins.m2release:m2release
Affected Version Ranges: < 0.15.0Fixed in: 0.15.0