CVE-2019-10289:
CSRF vulnerability in Jenkins Netsparker Enterprise Scan Plugin
6.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/13/2022
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:netsparker-cloud-scan | maven | <= 1.1.5 | 1.1.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability was in the form validation endpoint doValidateAPI which handled server connections. The patch:
- Adds @POST method restriction to prevent CSRF
- Introduces Jenkins.ADMINISTER permission check
- Changes API token parameter type from String to Secret These changes directly address the CWE-352 CSRF vulnerability by adding security controls that were previously missing. The function name is constructed from the class structure visible in the patch (NCScanBuilder inner class DescriptorImpl).