Vulnerability Details CVE-2019-10290
A missing permission check in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.5%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.0
Products affected by CVE-2019-10290
-
cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.0
-
cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.1
-
cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.2
-
cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.3
-
cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.4
-
cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.5