Moderate severityNVD Advisory· Published Aug 7, 2019· Updated Aug 4, 2024
CVE-2019-10388
CVE-2019-10388
Description
A cross-site request forgery vulnerability in Jenkins Relution Enterprise Appstore Publisher Plugin 1.24 and earlier allows attackers to have Jenkins initiate an HTTP connection to an attacker-specified server.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:relution-publisherMaven | <= 1.24 | — |
Affected products
1- Range: 1.24 and earlier
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-xjch-wqmw-fgcpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-10388ghsaADVISORY
- www.openwall.com/lists/oss-security/2019/08/07/1ghsamailing-listx_refsource_MLISTWEB
- jenkins.io/security/advisory/2019-08-07/ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.