First published: Wed Jul 31 2019(Updated: )
A cross-site request forgery vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins M2release | <=0.14.0 | |
maven/org.jenkins-ci.plugins.m2release:m2release | <0.15.0 | 0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10359 has a medium severity rating due to its potential for unauthorized releases within Jenkins.
To fix CVE-2019-10359, upgrade the Jenkins Maven Release Plugin to version 0.15.0 or later.
CVE-2019-10359 affects all versions of the Jenkins Maven Release Plugin up to and including 0.14.0.
CVE-2019-10359 is a cross-site request forgery (CSRF) vulnerability.
Yes, CVE-2019-10359 could allow attackers to perform unauthorized actions, potentially leading to data breaches.