A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
References
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2019/05/31/2 - | |
References | () http://www.securityfocus.com/bid/108540 - | |
References | () https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29 - | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 - |
25 Oct 2023, 18:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-05-31 15:29
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10321
Mitre link : CVE-2019-10321
CVE.ORG link : CVE-2019-10321
JSON object : View
Products Affected
jfrog
- artifactory
CWE
CWE-352
Cross-Site Request Forgery (CSRF)