Vulnerability Details CVE-2019-10310
A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 36.2%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.8
Products affected by CVE-2019-10310
-
cpe:2.3:a:jenkins:ansible_tower:0.5.0
-
cpe:2.3:a:jenkins:ansible_tower:0.5.1
-
cpe:2.3:a:jenkins:ansible_tower:0.5.2
-
cpe:2.3:a:jenkins:ansible_tower:0.5.3
-
cpe:2.3:a:jenkins:ansible_tower:0.5.4
-
cpe:2.3:a:jenkins:ansible_tower:0.6.0
-
cpe:2.3:a:jenkins:ansible_tower:0.6.1
-
cpe:2.3:a:jenkins:ansible_tower:0.7.0
-
cpe:2.3:a:jenkins:ansible_tower:0.8.0
-
cpe:2.3:a:jenkins:ansible_tower:0.8.1
-
cpe:2.3:a:jenkins:ansible_tower:0.8.2
-
cpe:2.3:a:jenkins:ansible_tower:0.8.3
-
cpe:2.3:a:jenkins:ansible_tower:0.8.4
-
cpe:2.3:a:jenkins:ansible_tower:0.8.5
-
cpe:2.3:a:jenkins:ansible_tower:0.8.6
-
cpe:2.3:a:jenkins:ansible_tower:0.8.7
-
cpe:2.3:a:jenkins:ansible_tower:0.9.0
-
cpe:2.3:a:jenkins:ansible_tower:0.9.1