6.5
CVSSv3

CVE-2019-1003012

Published: 06/02/2019 Updated: 25/10/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and previous versions in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows malicious users to bypass all cross-site request forgery protection in Blue Ocean API.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins blue ocean

redhat openshift container platform 3.11

Vendor Advisories

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1101 and earlier in blueocean-core-js/src/js/bundleStartupjs, blueocean-core-js/src/js/fetchts, blueocean-core-js/src/js/i18n/i18njs, blueocean-core-js/src/js/urlconfigjs, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusionjava, blueocean-web/src/main ...