First published: Thu Apr 04 2019(Updated: )
A cross-site request forgery vulnerability in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Soasta Cloudtest | ||
maven/com.soasta.jenkins:cloudtest | <=2.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003090 is rated as a medium severity vulnerability due to its ability to initiate unauthorized server connections.
To fix CVE-2019-1003090, update the Jenkins SOASTA CloudTest Plugin to version 2.26 or later.
CVE-2019-1003090 can enable cross-site request forgery (CSRF) attacks that target users of the Jenkins SOASTA CloudTest Plugin.
CVE-2019-1003090 affects all versions of the Jenkins SOASTA CloudTest Plugin up to and including version 2.25.
Yes, CVE-2019-1003090 is exploitative as it allows attackers to make unauthorized requests to specified servers.