A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published: 2019-02-06T16:00:00

Updated: 2024-08-05T03:00:19.427Z

Reserved: 2019-02-06T00:00:00

Link: CVE-2019-1003012

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-06T16:29:00.670

Modified: 2024-11-21T04:17:44.293

Link: CVE-2019-1003012

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-01-28T00:00:00Z

Links: CVE-2019-1003012 - Bugzilla