First published: Tue Dec 17 2019(Updated: )
A cross-site request forgery vulnerability in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers to have Jenkins evaluate a computationally expensive regular expression.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Build Failure Analyzer | <=1.24.1 | |
maven/com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer | <1.24.2 | 1.24.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2019-16553.
The severity of CVE-2019-16553 is high with a CVSS score of 8.8.
The affected software is Jenkins Build Failure Analyzer Plugin version 1.24.1 and earlier.
CVE-2019-16553 is a cross-site request forgery vulnerability in Jenkins Build Failure Analyzer Plugin that allows attackers to have Jenkins evaluate a computationally expensive regular expression.
To fix CVE-2019-16553, upgrade to a version of Jenkins Build Failure Analyzer Plugin that is later than 1.24.1.