Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-1003012

Опубликовано: 28 янв. 2019
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkins-plugin-blueoceanWill not fix
Red Hat OpenShift Container Platform 3.4jenkins-plugin-blueoceanWill not fix
Red Hat OpenShift Container Platform 3.5jenkins-plugin-blueoceanWill not fix
Red Hat OpenShift Container Platform 3.6jenkins-plugin-blueoceanWill not fix
Red Hat OpenShift Container Platform 3.7jenkins-plugin-blueoceanWill not fix
Red Hat OpenShift Container Platform 3.9jenkins-plugin-blueoceanWill not fix
Red Hat OpenShift Container Platform 4jenkins-2-pluginsAffected
Red Hat OpenShift Container Platform 3.11atomic-enterprise-service-catalogFixedRHBA-2019:032620.02.2019
Red Hat OpenShift Container Platform 3.11atomic-openshiftFixedRHBA-2019:032620.02.2019
Red Hat OpenShift Container Platform 3.11atomic-openshift-cluster-autoscalerFixedRHBA-2019:032620.02.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=1670298jenkins-plugin-blueocean: Blue Ocean did not require CSRF tokens (SECURITY-1201)

EPSS

Процентиль: 36%
0.00154
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
около 7 лет назад

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API.

CVSS3: 6.5
github
больше 3 лет назад

Cross-Site Request Forgery in Jenkins Blue Ocean Plugin

EPSS

Процентиль: 36%
0.00154
Низкий

7.3 High

CVSS3

Уязвимость CVE-2019-1003012