First published: Tue Jun 05 2018(Updated: )
A server-side request forgery vulnerability exists in Jenkins GitHub Branch Source Plugin 2.3.4 and older in Endpoint.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Github Branch Source | <=2.3.4 | |
maven/org.jenkins-ci.plugins:github-branch-source | <=2.3.4 | 2.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000185 is classified as a medium severity vulnerability due to its potential impact on server-side request forgery.
To fix CVE-2018-1000185, upgrade Jenkins GitHub Branch Source Plugin to version 2.3.5 or later.
CVE-2018-1000185 affects users of Jenkins GitHub Branch Source Plugin version 2.3.4 and older.
CVE-2018-1000185 is a server-side request forgery vulnerability that allows attackers to send unauthorized requests.
Exploitation of CVE-2018-1000185 requires the attacker to have Overall/Read access to the Jenkins instance.