A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-05T01:17:40.818Z
Reserved: 2019-09-20T00:00:00
Link: CVE-2019-16550

No data.

Status : Modified
Published: 2019-12-17T15:15:15.147
Modified: 2024-11-21T04:30:48.467
Link: CVE-2019-16550

No data.