First published: Wed Jan 09 2019(Updated: )
An improper authorization vulnerability exists in Jenkins Jira Plugin 3.0.1 and earlier in JiraSite.java that allows attackers with Overall/Read access to have Jenkins connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jira | <=3.0.1 | |
maven/org.jenkins-ci.plugins:jira | <=3.0.1 | 3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000412 is an improper authorization vulnerability in Jenkins Jira Plugin.
The severity of CVE-2018-1000412 is high with a score of 8.8.
CVE-2018-1000412 affects Jenkins Jira Plugin versions up to 3.0.1.
Attackers with Overall/Read access can use Jenkins to connect to a specified URL with attacker-specified credentials obtained through another method.
You can find more information about CVE-2018-1000412 in the references provided: http://www.securityfocus.com/bid/106532 and https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1029.