An arbitrary file read vulnerability in Jenkins File System SCM Plugin 2.1 and earlier allows attackers able to configure jobs in Jenkins to obtain the contents of any file on the Jenkins master.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2019/08/07/1 | Mailing List Third Party Advisory |
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2019/08/07/1 | Mailing List Third Party Advisory |
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569 | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2019/08/07/1 - Mailing List, Third Party Advisory | |
References | () https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569 - Vendor Advisory |
Information
Published : 2019-08-07 15:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10375
Mitre link : CVE-2019-10375
CVE.ORG link : CVE-2019-10375
JSON object : View
Products Affected
jenkins
- file_system_scm
CWE