First published: Tue Jun 05 2018(Updated: )
A server-side request forgery vulnerability exists in Jenkins CAS Plugin 1.4.1 and older in CasSecurityRealm.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cas | <=1.4.1 | |
maven/org.jenkins-ci.plugins:cas-plugin | <=1.4.1 | 1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000188 is classified as a medium severity vulnerability.
To remediate CVE-2018-1000188, update the Jenkins CAS Plugin to version 1.4.2 or later.
CVE-2018-1000188 is a server-side request forgery (SSRF) vulnerability affecting Jenkins CAS Plugin.
Users of Jenkins CAS Plugin version 1.4.1 and older are affected by CVE-2018-1000188.
Attackers with Overall/Read access can exploit CVE-2018-1000188 to send unauthorized GET requests to arbitrary URLs.