A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4506 A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Github GHSA Github GHSA GHSA-m6gf-p26p-mx2w Jenkins Docker Plugin contains Cross-Site Request Forgery
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-04T22:17:20.329Z

Reserved: 2019-03-29T00:00:00

Link: CVE-2019-10340

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-11T14:15:10.537

Modified: 2024-11-21T04:18:55.510

Link: CVE-2019-10340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.