First published: Tue Jun 05 2018(Updated: )
A server-side request forgery vulnerability exists in Jenkins GitHub Plugin 1.29.0 and older in GitHubPluginConfig.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Github | <=1.29.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000184 is a server-side request forgery vulnerability that exists in Jenkins GitHub Plugin 1.29.0 and older.
The vulnerability allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.
Jenkins GitHub Plugin versions up to and including 1.29.0 are affected by this vulnerability.
The severity rating of CVE-2018-1000184 is medium with a CVSS score of 5.4.
Upgrade Jenkins GitHub Plugin to a version that is newer than 1.29.0.