CVE-2019-1003012 – io.jenkins.blueocean:blueocean
Package
Manager: maven
Name: io.jenkins.blueocean:blueocean
Vulnerable Version: >=0 <1.10.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00163 pctl0.37795
Details
Cross-Site Request Forgery in Jenkins Blue Ocean Plugin A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API. The vulnerability is found in: - blueocean-core-js/src/js/bundleStartup.js - blueocean-core-js/src/js/fetch.ts - blueocean-core-js/src/js/i18n/i18n.js - blueocean-core-js/src/js/urlconfig.js - blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java - blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java - blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly
Metadata
Created: 2022-05-13T01:31:35Z
Modified: 2022-11-01T22:46:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qxh5-5r5p-5gvf/GHSA-qxh5-5r5p-5gvf.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-qxh5-5r5p-5gvf
Finding: F007
Auto approve: 1