From 089ecce12a8fdd18b022adf6a51e04c8835cae5c Mon Sep 17 00:00:00 2001 From: Bishop Date: Wed, 8 Jul 2020 06:12:38 +0000 Subject: [PATCH] Add CVE-2020-2215 --- database/java/2020/2215.yaml | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 database/java/2020/2215.yaml diff --git a/database/java/2020/2215.yaml b/database/java/2020/2215.yaml new file mode 100644 index 0000000000..1473e63778 --- /dev/null +++ b/database/java/2020/2215.yaml @@ -0,0 +1,16 @@ +--- +cve: 2020-2215 +title: CVE in com.marvelution.jira.plugins:jira-jenkins-plugin +description: > + A cross-site request forgery vulnerability in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified username and password. +cvss_v2: 4.3 +references: + - http://www.openwall.com/lists/oss-security/2020/07/02/7 + - https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1762 +affected: + - groupId: com.marvelution.jira.plugins + artifactId: jira-jenkins-plugin + version: + - "<=1.5.0" + fixedin: + - ">=1.5.1"