4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
6.6 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
61.3%
A cross-site request forgery vulnerability in Jenkins Zephyr Enterprise Test Management Plugin in the ZeeDescriptor#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.
CPE | Name | Operator | Version |
---|---|---|---|
org.jenkins-ci.plugins:zephyr-enterprise-test-management | lt | 1.8 |
www.openwall.com/lists/oss-security/2019/04/12/2
www.securityfocus.com/bid/107790
github.com/advisories/GHSA-qj8p-c733-v494
github.com/jenkinsci/zephyr-enterprise-test-management-plugin/commit/a2a698660c12d78e06f78c813c3ff10b4c30db16
jenkins.io/security/advisory/2019-04-03/#SECURITY-993
nvd.nist.gov/vuln/detail/CVE-2019-1003084
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
6.6 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
61.3%