First published: Wed Feb 06 2019(Updated: )
A cross-site request forgery vulnerability exists in Jenkins Warnings Next Generation Plugin 2.1.1 and earlier in src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:warnings-ng | <=2.1.1 | |
Jenkins Warnings | <=2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003008 is classified as a critical severity vulnerability due to its potential for executing arbitrary code.
To fix CVE-2019-1003008, upgrade the Jenkins Warnings Next Generation Plugin to version 2.1.2 or later.
CVE-2019-1003008 is caused by a cross-site request forgery vulnerability present in the form validation HTTP endpoint of the plugin.
Jenkins Warnings Next Generation Plugin versions 2.1.1 and earlier are affected by CVE-2019-1003008.
Currently, there is no acknowledged workaround for CVE-2019-1003008; updating the plugin is essential.