A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-3866 | A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents. |
![]() |
GHSA-g2x8-xw86-vpq3 | Cross-site request forgery (CSRF) vulnerability in Jenkins Maven Release Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-05T01:17:40.818Z
Reserved: 2019-09-20T00:00:00
Link: CVE-2019-16550

No data.

Status : Modified
Published: 2019-12-17T15:15:15.147
Modified: 2024-11-21T04:30:48.467
Link: CVE-2019-16550

No data.

No data.