A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java that allows attackers to have Jenkins send HTTP requests to an attacker-specified host.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104960 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2018-07-30/#SECURITY-994 | Vendor Advisory |
http://www.securityfocus.com/bid/104960 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2018-07-30/#SECURITY-994 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/104960 - Third Party Advisory, VDB Entry | |
References | () https://jenkins.io/security/advisory/2018-07-30/#SECURITY-994 - Vendor Advisory |
Information
Published : 2018-08-01 13:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999026
Mitre link : CVE-2018-1999026
CVE.ORG link : CVE-2018-1999026
JSON object : View
Products Affected
jenkins
- tracetronic_ecu-test
CWE
CWE-918
Server-Side Request Forgery (SSRF)