{"id":"CVE-2019-10310","details":"A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins","aliases":["GHSA-vrvm-459q-j824"],"modified":"2026-04-10T04:13:46.179491Z","published":"2019-04-30T13:29:05.470Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/108159"},{"type":"WEB","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0786"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/04/30/5"},{"type":"ADVISORY","url":"https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1355"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/ansible-tower-plugin","events":[{"introduced":"0"},{"last_affected":"2e66eb187823e8fcdae6a0cc94400a81db3a6576"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.9.1"}]}}],"versions":["ansible-tower-0.5.0","ansible-tower-0.5.2","ansible-tower-0.5.4","ansible-tower-0.6.0","ansible-tower-0.6.1","ansible-tower-0.7.0","ansible-tower-0.8.0","ansible-tower-0.8.1","ansible-tower-0.8.2","ansible-tower-0.8.3","ansible-tower-0.8.4","ansible-tower-0.8.5","ansible-tower-0.8.6","ansible-tower-0.8.7","ansible-tower-0.9.0","ansible-tower-0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10310.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}