Vulnerability Details CVE-2019-10359
A cross-site request forgery vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 34.5%
CVSS Severity
CVSS v3 Score 6.3
CVSS v2 Score 6.8
Products affected by CVE-2019-10359
-
cpe:2.3:a:jenkins:m2release:-
-
cpe:2.3:a:jenkins:m2release:0.1.0
-
cpe:2.3:a:jenkins:m2release:0.10.0
-
cpe:2.3:a:jenkins:m2release:0.11.0
-
cpe:2.3:a:jenkins:m2release:0.12.0
-
cpe:2.3:a:jenkins:m2release:0.13.0
-
cpe:2.3:a:jenkins:m2release:0.14.0
-
cpe:2.3:a:jenkins:m2release:0.2.0
-
cpe:2.3:a:jenkins:m2release:0.3.0
-
cpe:2.3:a:jenkins:m2release:0.3.1
-
cpe:2.3:a:jenkins:m2release:0.3.2
-
cpe:2.3:a:jenkins:m2release:0.3.3
-
cpe:2.3:a:jenkins:m2release:0.3.4
-
cpe:2.3:a:jenkins:m2release:0.4.0
-
cpe:2.3:a:jenkins:m2release:0.5.0
-
cpe:2.3:a:jenkins:m2release:0.5.1
-
cpe:2.3:a:jenkins:m2release:0.5.2
-
cpe:2.3:a:jenkins:m2release:0.5.3
-
cpe:2.3:a:jenkins:m2release:0.6.0
-
cpe:2.3:a:jenkins:m2release:0.6.1
-
cpe:2.3:a:jenkins:m2release:0.7.0
-
cpe:2.3:a:jenkins:m2release:0.7.1
-
cpe:2.3:a:jenkins:m2release:0.8.0
-
cpe:2.3:a:jenkins:m2release:0.8.1
-
cpe:2.3:a:jenkins:m2release:0.9.0
-
cpe:2.3:a:jenkins:m2release:0.9.1