Rapid7 Vulnerability & Exploit Database

Red Hat OpenShift: CVE-2019-1003012: jenkins-plugin-blueocean: Blue Ocean did not require CSRF tokens (SECURITY-1201)

Back to Search

Red Hat OpenShift: CVE-2019-1003012: jenkins-plugin-blueocean: Blue Ocean did not require CSRF tokens (SECURITY-1201)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
02/06/2019
Created
03/19/2019
Added
03/15/2019
Modified
04/25/2019

Description

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API.

Solution(s)

  • linuxrpm-upgrade-jenkins-2-plugins

References

  • linuxrpm-upgrade-jenkins-2-plugins

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;