Vulnerability Details CVE-2018-1000013
Jenkins Release Plugin 2.9 and earlier did not require form submissions to be submitted via POST, resulting in a CSRF vulnerability allowing attackers to trigger release builds.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 19.7%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.8
Products affected by CVE-2018-1000013
-
cpe:2.3:a:jenkins:release:1.0
-
cpe:2.3:a:jenkins:release:1.0.10
-
cpe:2.3:a:jenkins:release:1.1
-
cpe:2.3:a:jenkins:release:1.10
-
cpe:2.3:a:jenkins:release:1.11
-
cpe:2.3:a:jenkins:release:1.2
-
cpe:2.3:a:jenkins:release:1.3
-
cpe:2.3:a:jenkins:release:1.4
-
cpe:2.3:a:jenkins:release:1.5
-
cpe:2.3:a:jenkins:release:1.6
-
cpe:2.3:a:jenkins:release:1.7
-
cpe:2.3:a:jenkins:release:1.8
-
cpe:2.3:a:jenkins:release:1.9
-
cpe:2.3:a:jenkins:release:2.0
-
cpe:2.3:a:jenkins:release:2.1
-
cpe:2.3:a:jenkins:release:2.2
-
cpe:2.3:a:jenkins:release:2.3
-
cpe:2.3:a:jenkins:release:2.4
-
cpe:2.3:a:jenkins:release:2.4.1
-
cpe:2.3:a:jenkins:release:2.5
-
cpe:2.3:a:jenkins:release:2.5.1
-
cpe:2.3:a:jenkins:release:2.5.2
-
cpe:2.3:a:jenkins:release:2.5.3
-
cpe:2.3:a:jenkins:release:2.5.4
-
cpe:2.3:a:jenkins:release:2.6
-
cpe:2.3:a:jenkins:release:2.6.1
-
cpe:2.3:a:jenkins:release:2.7
-
cpe:2.3:a:jenkins:release:2.8
-
cpe:2.3:a:jenkins:release:2.9