First published: Tue Jun 11 2019(Updated: )
A cross-site request forgery vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration#doTestConnection allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Electricflow | <=1.1.5 | |
maven/org.jenkins-ci.plugins:electricflow | <=1.1.6 | 1.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10331 is a cross-site request forgery vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration as Code Plugin.
The severity of CVE-2019-10331 is medium with a CVSS v3.0 base score of 4.3.
CVE-2019-10331 affects Jenkins ElectricFlow Plugin version 1.1.5 and earlier in Configuration as Code Plugin.
To fix CVE-2019-10331, update Jenkins ElectricFlow Plugin to version 1.1.7 or later.
You can find more information about CVE-2019-10331 on the Openwall, SecurityFocus, and Jenkins websites.