A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681 | vendor advisory |
http://www.openwall.com/lists/oss-security/2019/12/17/1 | third party advisory mailing list |