First published: Tue Dec 17 2019(Updated: )
A cross-site request forgery vulnerability in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Gerrit Trigger | <=2.30.1 | |
maven/com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger | <2.30.2 | 2.30.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16551 is rated as a medium severity vulnerability.
To remediate CVE-2019-16551, upgrade the Jenkins Gerrit Trigger Plugin to version 2.30.2 or later.
CVE-2019-16551 affects Jenkins Gerrit Trigger Plugin versions 2.30.1 and earlier.
CVE-2019-16551 is a cross-site request forgery vulnerability.
CVE-2019-16551 allows attackers to connect to specified HTTP URLs or SSH servers using attacker-controlled credentials.