7.1
CVSSv3

CVE-2019-1003044

Published: 28/03/2019 Updated: 25/10/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.1 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 187
Vector: AV:N/AC:H/Au:S/C:P/I:N/A:N

Vulnerability Summary

A cross-site request forgery vulnerability in Jenkins Slack Notification Plugin 2.19 and previous versions allows malicious users to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins slack notification

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Multiple vulnerabilities in Jenkins plugins <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Daniel Beck &lt;m ...

Github Repositories

Service (and data layer) for CVE Dashboard

CVE Service Layer API This is an application developed using the Spring Boot Web MVC starter project that exposes multiple URL endpoints for retrieving Common Vulnerabilities and Exposures (CVEs) These vulnerabilities were obtained from the National Vulnerability Database's data feeds These data feeds were downloaded and subsequently scrubbed using Elasticsearch and ad