{"id":"CVE-2019-1003012","details":"A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API.","aliases":["GHSA-qxh5-5r5p-5gvf"],"modified":"2026-04-10T04:13:37.558765Z","published":"2019-02-06T16:29:00.670Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHBA-2019:0326"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"type":"ADVISORY","url":"https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1201"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/blueocean-plugin","events":[{"introduced":"0"},{"last_affected":"dea18c4324deb3af4f545f714772f1ee7557cb06"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.10.1"}]}}],"versions":["blueocean-parent-1.0-alpha-1","blueocean-parent-1.0-alpha-2","blueocean-parent-1.0-alpha-3","blueocean-parent-1.0-alpha-4","blueocean-parent-1.0-alpha-5","blueocean-parent-1.0-alpha-6","blueocean-parent-1.0-alpha-7","blueocean-parent-1.0-alpha-8","blueocean-parent-1.0-alpha-9","blueocean-parent-1.0.0-b01","blueocean-parent-1.0.0-b02","blueocean-parent-1.0.0-b03","blueocean-parent-1.0.0-b04","blueocean-parent-1.0.0-b05","blueocean-parent-1.0.0-b06","blueocean-parent-1.0.0-b07","blueocean-parent-1.0.0-b08","blueocean-parent-1.0.0-b09","blueocean-parent-1.0.0-b10","blueocean-parent-1.0.0-b11","blueocean-parent-1.0.0-b12","blueocean-parent-1.0.0-b13","blueocean-parent-1.0.0-b14","blueocean-parent-1.0.0-b15","blueocean-parent-1.0.0-b16","blueocean-parent-1.0.0-b17","blueocean-parent-1.0.0-b18","blueocean-parent-1.0.0-b19","blueocean-parent-1.0.0-b20","blueocean-parent-1.0.0-b21","blueocean-parent-1.0.0-b22","blueocean-parent-1.0.0-b23","blueocean-parent-1.0.0-b24","blueocean-parent-1.0.0-b25","blueocean-parent-1.0.0-rc1","blueocean-parent-1.0.0-rc2","blueocean-parent-1.0.0-rc3","blueocean-parent-1.1.0-beta-1","blueocean-parent-1.1.0-beta-2","blueocean-parent-1.1.0-beta-3","blueocean-parent-1.1.0-beta-4","blueocean-parent-1.1.0-beta-5","blueocean-parent-1.1.0-beta-6","blueocean-parent-1.1.0-beta-7","blueocean-parent-1.1.0-beta-8","blueocean-parent-1.1.0-beta-9","blueocean-parent-1.10.0","blueocean-parent-1.10.1","blueocean-parent-1.2.0-beta-1","blueocean-parent-1.2.0-beta-2","blueocean-parent-1.2.0-beta-3","blueocean-parent-1.2.0-beta-4","blueocean-parent-1.2.0-beta-5","blueocean-parent-1.3.0-beta-1","blueocean-parent-1.3.0-beta-2","blueocean-parent-1.3.0-beta-3","blueocean-parent-1.3.0-beta-4","blueocean-parent-1.3.0-beta-5","blueocean-parent-1.4.0-beta-1","blueocean-parent-1.4.0-beta-2","blueocean-parent-1.4.0-beta-3","blueocean-parent-1.4.0-beta-4","blueocean-parent-1.4.0-beta-5","blueocean-parent-1.5.0-beta-1","blueocean-parent-1.5.0-beta-2","blueocean-parent-1.6.0-beta-1","blueocean-parent-1.6.0-beta-2","blueocean-parent-1.6.0-beta-3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1003012.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.11"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}