CVE-2020-2196

Source
https://cve.org/CVERecord?id=CVE-2020-2196
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-2196.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-2196
Aliases
Published
2020-06-03T13:15:11.007Z
Modified
2025-11-20T11:20:26.272547Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jenkins Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints, allowing attackers to perform all administrative actions provided by the plugin.

References

Affected packages

Git / github.com/jenkinsci/selenium-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/selenium-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

selenium-1.*
selenium-1.4
selenium-1.5
selenium-2.*
selenium-2.0
selenium-2.1
selenium-2.2
selenium-2.3
selenium-2.4
selenium-2.4.1
selenium-2.53.0
selenium-2.53.1
selenium-3.*
selenium-3.1.0
selenium-3.12.0
selenium-3.141.59
selenium-3.7.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-2196.json"