First published: Wed Jan 09 2019(Updated: )
An improper authorization vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java that allows attackers to have Jenkins perform a connection test, connecting to an attacker-specified server with attacker-specified credentials and connection settings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Crowd | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000422 has been classified as a medium severity vulnerability.
To fix CVE-2018-1000422, upgrade to Jenkins Crowd 2 Integration Plugin version 2.0.1 or later.
CVE-2018-1000422 affects Atlassian Crowd 2 Integration Plugin versions 2.0.0 and earlier in Jenkins.
CVE-2018-1000422 is an improper authorization vulnerability.
Attackers can use CVE-2018-1000422 to execute a connection test to attacker-specified servers using their own credentials.