A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2019/05/31/2 | mailing list |
http://www.securityfocus.com/bid/108540 | vdb entry |
https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391 | vendor advisory |