ASA-2019-00604 – Jenkins Deploy WebLogic Plugin: Cross-Site Request Forgery


Allele Security Alert

ASA-2019-00604

Identifier(s)

ASA-2019-00604, CVE-2019-10464, SECURITY-820

Title

Cross-Site Request Forgery

Vendor(s)

Raphael CHAUMIER

Product(s)

Jenkins Deploy WebLogic Plugin

Affected version(s)

Jenkins Deploy WebLogic Plugin up to and including 4.1

Fixed version(s)

Unknown

Proof of concept

Unknown

Description

The form validation method does not require POST requests, resulting in a CSRF vulnerability.

Technical details

Unknown

Credits

Thomas de Grenier de Latour

Reference(s)

Jenkins Security Advisory 2019-10-23
https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820

Jenkins security advisory
https://groups.google.com/d/msg/jenkinsci-advisories/KCv6eDsiV3Y/GNr0aDC3AQAJ

oss-security – Multiple vulnerabilities in Jenkins plugins
https://www.openwall.com/lists/oss-security/2019/10/23/2

Jenkins Plugins
https://plugins.jenkins.io/weblogic-deployer-plugin

CVE-2019-10464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10464

CVE-2019-10464
https://nvd.nist.gov/vuln/detail/CVE-2019-10464

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: November 4, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.