A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3866 | A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents. |
Github GHSA |
GHSA-g2x8-xw86-vpq3 | Cross-site request forgery (CSRF) vulnerability in Jenkins Maven Release Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-05T01:17:40.818Z
Reserved: 2019-09-20T00:00:00
Link: CVE-2019-16550
No data.
Status : Modified
Published: 2019-12-17T15:15:15.147
Modified: 2024-11-21T04:30:48.467
Link: CVE-2019-16550
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA