[MAVEN:GHSA-G2X8-XW86-VPQ3] Cross-site request forgery (CSRF) vulnerability in Jenkins Maven Release Plugin

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 1

A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.

Package Affected Version
pkg:maven/org.jenkins-ci.plugins.m2release/m2release <= 0.16.1
ID
MAVEN:GHSA-G2X8-XW86-VPQ3
Severity
high
URL
https://github.com/advisories/GHSA-g2x8-xw86-vpq3
Published
2022-05-24T17:03:46
(2 years ago)
Modified
2023-12-14T18:20:41
(9 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins.m2release/m2release org.jenkins-ci.plugins.m2release m2release <= 0.16.1
Fixed pkg:maven/org.jenkins-ci.plugins.m2release/m2release org.jenkins-ci.plugins.m2release m2release = 0.16.2
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...