First published: Tue Jan 23 2018(Updated: )
Jenkins Release Plugin 2.9 and earlier did not require form submissions to be submitted via POST, resulting in a CSRF vulnerability allowing attackers to trigger release builds.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Release | <=2.9 | |
maven/org.jenkins-ci.plugins:release | <2.10 | 2.10 |
<=2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000013 is considered a medium severity vulnerability due to its potential exploitation for unauthorized actions.
To mitigate CVE-2018-1000013, upgrade the Jenkins Release Plugin to version 2.10 or later.
CVE-2018-1000013 is a Cross-Site Request Forgery (CSRF) vulnerability.
CVE-2018-1000013 affects Jenkins Release Plugin versions up to 2.9 inclusive.
Any user running Jenkins Release Plugin version 2.9 or earlier is at risk of CVE-2018-1000013.