First published: Wed Aug 01 2018(Updated: )
A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java that allows attackers to have Jenkins send HTTP requests to an attacker-specified host.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Tracetronic Ecu-test | <=2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999026 has been assigned a medium severity rating due to its potential for server-side request forgery.
To fix CVE-2018-1999026, upgrade the Jenkins TraceTronic ECU-TEST Plugin to version 2.4 or later.
CVE-2018-1999026 can be exploited by attackers to send unauthorized HTTP requests to an attacker-controlled server.
Jenkins TraceTronic ECU-TEST Plugin versions 2.3 and earlier are affected by CVE-2018-1999026.
You are affected by CVE-2018-1999026 if you are using Jenkins with the TraceTronic ECU-TEST Plugin version 2.3 or earlier.