CVE-2020-2196

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-2196
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-2196.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-2196
Aliases
Published
2020-06-03T13:15:11Z
Modified
2025-01-14T08:37:51.160482Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jenkins Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints, allowing attackers to perform all administrative actions provided by the plugin.

References

Affected packages

Git / github.com/jenkinsci/selenium-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/selenium-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

selenium-1.*

selenium-1.4
selenium-1.5

selenium-2.*

selenium-2.0
selenium-2.1
selenium-2.2
selenium-2.3
selenium-2.4
selenium-2.4.1
selenium-2.53.0
selenium-2.53.1

selenium-3.*

selenium-3.1.0
selenium-3.12.0
selenium-3.141.59
selenium-3.7.1