6.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
33.2%
A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
www.openwall.com/lists/oss-security/2019/12/17/1
github.com/jenkinsci/m2release-plugin
github.com/jenkinsci/m2release-plugin/commit/1e4d6fee2eab16e7a396b6d3d5f10a87e5c29cc2
jenkins.io/security/advisory/2019-12-17/#SECURITY-1681
nvd.nist.gov/vuln/detail/CVE-2019-16550