A server-side request forgery vulnerability exists in Jenkins Confluence Publisher Plugin 2.0.1 and earlier in ConfluenceSite.java that allows attackers to have Jenkins submit login requests to an attacker-specified Confluence server URL with attacker specified credentials.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-07-30/#SECURITY-982 | Vendor Advisory |
https://jenkins.io/security/advisory/2018-07-30/#SECURITY-982 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2018-07-30/#SECURITY-982 - Vendor Advisory |
Information
Published : 2018-08-01 13:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999039
Mitre link : CVE-2018-1999039
CVE.ORG link : CVE-2018-1999039
JSON object : View
Products Affected
jenkins
- confluence_publisher
CWE
CWE-918
Server-Side Request Forgery (SSRF)