CVE-2019-10309

Jenkins Self-Organizing Swarm Plug-in Modules Plugin clients that use UDP broadcasts to discover Jenkins masters do not prevent XML External Entity processing when processing the responses, allowing unauthorized attackers on the same network to read arbitrary files from Swarm clients.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:self-organizing_swarm_modules:-:*:*:*:*:jenkins:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/04/30/5 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/04/30/5 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/108159 - () http://www.securityfocus.com/bid/108159 -
References () https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1252 - Vendor Advisory () https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1252 - Vendor Advisory
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0783 - () https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0783 -

Information

Published : 2019-04-30 13:29

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10309

Mitre link : CVE-2019-10309

CVE.ORG link : CVE-2019-10309


JSON object : View

Products Affected

jenkins

  • self-organizing_swarm_modules
CWE
CWE-611

Improper Restriction of XML External Entity Reference