First published: Wed Feb 06 2019(Updated: )
An XML external entity (XXE) processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, perform a denial of service attack, etc.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Job Import | <=2.1 | |
maven/org.jenkins-ci.plugins:job-import-plugin | <3.0 | 3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003015 is classified as a medium severity vulnerability.
To fix CVE-2019-1003015, upgrade the Jenkins Job Import Plugin to version 3.0 or later.
CVE-2019-1003015 affects the Jenkins Job Import Plugin version 2.1 and earlier.
CVE-2019-1003015 is an XML external entity (XXE) processing vulnerability.
Attackers with control over the HTTP server queried during job import can exploit CVE-2019-1003015.