First published: Wed Feb 06 2019(Updated: )
An information exposure and denial of service vulnerability exists in Jenkins Token Macro Plugin 2.5 and earlier in src/main/java/org/jenkinsci/plugins/tokenmacro/Parser.java, src/main/java/org/jenkinsci/plugins/tokenmacro/TokenMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/AbstractChangesSinceMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ChangesSinceLastBuildMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ProjectUrlMacro.java that allows attackers with the ability to control token macro input (such as SCM changelogs) to define recursive input that results in unexpected macro evaluation.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:token-macro | <=2.5 | 2.6 |
Jenkins Token Macro | <=2.5 | |
Red Hat OpenShift Container Platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003011 is classified as an information exposure and denial of service vulnerability.
To fix CVE-2019-1003011, upgrade the Jenkins Token Macro Plugin to version 2.6 or later.
CVE-2019-1003011 affects Jenkins Token Macro Plugin version 2.5 and earlier, as well as Red Hat OpenShift Container Platform version 3.11.
CVE-2019-1003011 includes both information exposure and denial of service vulnerabilities.
There are no known workarounds for CVE-2019-1003011; the best action is to upgrade the affected software.