CVE-2019-10310

Severity
8.8HIGH
EPSS
0.1%
top 65.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 30
Latest updateMay 24

Description

A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

🔴Vulnerability Details

3
OSV
Jenkins Ansible Tower Plugin cross-site request forgery vulnerability2022-05-24
GHSA
Jenkins Ansible Tower Plugin cross-site request forgery vulnerability2022-05-24
CVEList
CVE-2019-10310: A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 02019-04-30

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2019-04-302019-04-30
Red Hat
ansible-tower: cross-site request forgery could result in credentials disclosure2019-04-30

💬Community

1
Bugzilla
CVE-2019-10310 ansible-tower: cross-site request forgery could result in credentials disclosure2020-04-30
CVE-2019-10310 (HIGH CVSS 8.8) | A cross-site request forgery vulner | cvebase.io