A cross-site request forgery vulnerability exists in Jenkins Git Plugin 3.9.1 and earlier in src/main/java/hudson/plugins/git/GitTagAction.java that allows attackers to create a Git tag in a workspace and attach corresponding metadata to a build record.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1095 | vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0326 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0327 | third party advisory vendor advisory |