First published: Thu Mar 28 2019(Updated: )
A missing permission check in Jenkins Slack Notification Plugin 2.19 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Slack Notification | <=2.19 | |
maven/org.jenkins-ci.plugins:slack | <=2.19 | 2.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003043 is classified as a critical vulnerability due to its potential to expose sensitive credentials in Jenkins.
To fix CVE-2019-1003043, update the Jenkins Slack Notification Plugin to version 2.20 or later.
CVE-2019-1003043 affects Jenkins Slack Notification Plugin versions up to and including 2.19.
CVE-2019-1003043 allows attackers with Overall/Read permission to connect to attacker-specified URLs and capture Jenkins credentials.
Any Jenkins user with Overall/Read permission could be impacted by CVE-2019-1003043 if they have access to the vulnerable Slack Notification Plugin.