First published: Wed Aug 12 2020(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows attackers to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Pipeline Maven Integration | <=3.8.2 | |
maven/org.jenkins-ci.plugins:pipeline-maven | <3.8.3 | 3.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-2235.
The severity of CVE-2020-2235 is high with a CVSS score of 7.1.
Pipeline Maven Integration Plugin version 3.8.2 and earlier and Jenkins with Overall/Read access are affected by CVE-2020-2235.
An attacker can exploit CVE-2020-2235 by connecting to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method.
Yes, upgrading to Pipeline Maven Integration Plugin version 3.8.3 or later will fix CVE-2020-2235.