Build-Publisher Plugin up to 1.22 on Jenkins API Endpoint config.xml cross-site request forgery

A vulnerability has been found in Build-Publisher Plugin up to 1.22 on Jenkins (Jenkins Plugin) and classified as problematic. This vulnerability affects some unknown processing of the file config.xml of the component API Endpoint. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

128

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%38
50%11

Approve Conf

90%38
80%11
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302413709/23/2022VulD...price_0day$0-$5ksee exploit price documentation09/23/2022accepted
90
1302413609/23/2022VulD...cvss3_meta_tempscore6.1see CVSS documentation09/23/2022accepted
90
1302413509/23/2022VulD...cvss3_meta_basescore6.1see CVSS documentation09/23/2022accepted
90
1302413409/23/2022VulD...cvss3_vuldb_tempscore4.3see CVSS documentation09/23/2022accepted
90
1302413309/23/2022VulD...cvss3_vuldb_basescore4.3see CVSS documentation09/23/2022accepted
90
1302413209/23/2022VulD...cvss2_vuldb_tempscore5.0see CVSS documentation09/23/2022accepted
90
1302413109/23/2022VulD...cvss2_vuldb_basescore5.0see CVSS documentation09/23/2022accepted
90
1302413009/23/2022VulD...cvss3_nvd_basescore8.0nist.gov09/23/2022accepted
90
1302412909/23/2022VulD...cvss3_vuldb_rlXderived from historical data09/23/2022accepted
80
1302412809/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302412709/23/2022VulD...cvss2_vuldb_rlNDderived from historical data09/23/2022accepted
80
1302412609/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302412509/23/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector09/23/2022accepted
80
1302412409/23/2022VulD...cvss2_vuldb_aiNderived from vuldb v3 vector09/23/2022accepted
80
1302412309/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector09/23/2022accepted
80
1302412209/23/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector09/23/2022accepted
80
1302412109/23/2022VulD...cvss2_vuldb_auNderived from vuldb v3 vector09/23/2022accepted
80
1302412009/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80
1302411909/23/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector09/23/2022accepted
80
1302411809/23/2022VulD...typeJenkins Plugin09/23/2022accepted
90

29 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!