ID CVE-2019-10290
Summary A missing permission check in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
References
Vulnerable Configurations
  • cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.5:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.5:*:*:*:*:jenkins:*:*
CVSS
Base: 4.0 (as of 02-10-2020 - 14:47)
Impact:
Exploitability:
CWE CWE-862
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:P/A:N
refmap via4
bid 107790
confirm https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1032
mlist [oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins
Last major update 02-10-2020 - 14:47
Published 04-04-2019 - 16:29
Last modified 02-10-2020 - 14:47
Back to Top