Description
A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3866 | A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents. |
Github GHSA |
GHSA-g2x8-xw86-vpq3 | Cross-site request forgery (CSRF) vulnerability in Jenkins Maven Release Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-05T01:17:40.818Z
Reserved: 2019-09-20T00:00:00.000Z
Link: CVE-2019-16550
No data.
Status : Modified
Published: 2019-12-17T15:15:15.147
Modified: 2024-11-21T04:30:48.467
Link: CVE-2019-16550
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA