CVE-2019-10300Cross-Site Request Forgery in Jenkins Gitlab

Severity
8.0HIGHNVD
EPSS
0.1%
top 75.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 18
Latest updateMay 24

Description

A cross-site request forgery vulnerability in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages2 packages

CVEListV5jenkins_project/jenkins_gitlab_plugin1.5.11 and earlier
NVDjenkins/gitlab1.5.11

🔴Vulnerability Details

3
OSV
Jenkins GitLab Plugin Cross-Site Request Forgery vulnerability2022-05-24
GHSA
Jenkins GitLab Plugin Cross-Site Request Forgery vulnerability2022-05-24
CVEList
CVE-2019-10300: A cross-site request forgery vulnerability in Jenkins GitLab Plugin 12019-04-18

📋Vendor Advisories

2
GitLab
CVE-2019-10300: A cross-site request forgery vulnerability in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation2019-04-18
Jenkins
Jenkins Security Advisory 2019-04-172019-04-17
CVE-2019-10300 — Cross-Site Request Forgery in Jenkins | cvebase