First published: Thu Nov 21 2019(Updated: )
A cross-site request forgery vulnerability in Jenkins Google Compute Engine Plugin 4.1.1 and earlier in ComputeEngineCloud#doProvision could be used to provision new agents.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:google-compute-engine | <=4.1.1 | 4.2.0 |
Jenkins Google Compute Engine | <4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-16548 is high with a severity value of 8.8.
CVE-2019-16548 is a cross-site request forgery vulnerability in Jenkins Google Compute Engine Plugin that allows the provisioning of new agents.
CVE-2019-16548 affects Jenkins Google Compute Engine Plugin version 4.1.1 and earlier in ComputeEngineCloud#doProvision.
To fix the vulnerability CVE-2019-16548, update Jenkins Google Compute Engine Plugin to version 4.2.0 or later.
Yes, you can find references for CVE-2019-16548 at the following links: [Link 1](http://www.openwall.com/lists/oss-security/2019/11/21/1), [Link 2](https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1586).