First published: Tue Sep 01 2020(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier allows attackers to connect to an attacker-specified database server using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Database | <=1.6 | |
maven/org.jenkins-ci.plugins:database | <=1.6 | 1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-2241.
The title of this vulnerability is a cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier.
CVE-2020-2241 has a severity rating of 8.8 (high).
Jenkins database Plugin versions up to and including 1.6 are affected by this vulnerability.
An attacker can exploit this vulnerability by performing a cross-site request forgery attack to connect to an attacker-specified database server using attacker-specified credentials.