{"id":"CVE-2019-10437","details":"A cross-site request forgery vulnerability in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.","aliases":["GHSA-62fp-j75q-mqhc"],"modified":"2026-04-11T18:24:22.795252Z","published":"2019-10-16T14:15:11.417Z","references":[{"type":"ADVISORY","url":"https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1006%20%281%29"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/crx-content-package-deployer-plugin","events":[{"introduced":"0"},{"last_affected":"fd8f6734c01c590b1916c9cebf809f199d022793"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.8.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:jenkins:crx_content_package_deployer:*:*:*:*:*:jenkins:*:*"}}],"versions":["crx-content-package-deployer-1.0","crx-content-package-deployer-1.1","crx-content-package-deployer-1.2","crx-content-package-deployer-1.2.1","crx-content-package-deployer-1.2.2","crx-content-package-deployer-1.3","crx-content-package-deployer-1.3.1","crx-content-package-deployer-1.3.2","crx-content-package-deployer-1.4","crx-content-package-deployer-1.5","crx-content-package-deployer-1.5.1","crx-content-package-deployer-1.5.2","crx-content-package-deployer-1.5.3","crx-content-package-deployer-1.5.4","crx-content-package-deployer-1.6","crx-content-package-deployer-1.6.1","crx-content-package-deployer-1.6.2","crx-content-package-deployer-1.6.3","crx-content-package-deployer-1.7","crx-content-package-deployer-1.7.1","crx-content-package-deployer-1.7.2","crx-content-package-deployer-1.8","crx-content-package-deployer-1.8.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10437.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}