ID CVE-2019-1003081
Summary A missing permission check in Jenkins OpenShift Deployer Plugin in the DeployApplication.DeployApplicationDescriptor#doCheckLogin form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
References
Vulnerable Configurations
  • cpe:2.3:a:jenkins:openshift_deployer:-:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:openshift_deployer:-:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:openshift_deployer:1.0.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:openshift_deployer:1.0.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:openshift_deployer:1.0.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:openshift_deployer:1.0.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:openshift_deployer:1.0.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:openshift_deployer:1.0.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:openshift_deployer:1.0.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:openshift_deployer:1.0.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:openshift_deployer:1.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:openshift_deployer:1.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:openshift_deployer:1.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:openshift_deployer:1.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:openshift_deployer:1.2.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:openshift_deployer:1.2.0:*:*:*:*:jenkins:*:*
CVSS
Base: 4.0 (as of 15-07-2020 - 13:50)
Impact:
Exploitability:
CWE CWE-862
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:P/A:N
refmap via4
bid 107790
confirm https://jenkins.io/security/advisory/2019-04-03/#SECURITY-981
mlist [oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins
Last major update 15-07-2020 - 13:50
Published 04-04-2019 - 16:29
Last modified 15-07-2020 - 13:50
Back to Top