First published: Thu Apr 04 2019(Updated: )
A cross-site request forgery vulnerability in Jenkins FTP publisher Plugin in the FTPPublisher.DescriptorImpl#doLoginCheck method allows attackers to initiate a connection to an attacker-specified server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ftp Publisher | ||
maven/org.jvnet.hudson.plugins:ftppublisher | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003058 is classified as a medium severity vulnerability.
To fix CVE-2019-1003058, update the Jenkins FTP Publisher Plugin to a version higher than 1.2.
CVE-2019-1003058 affects the Jenkins FTP Publisher Plugin, particularly versions up to and including 1.2.
The impact of CVE-2019-1003058 allows attackers to initiate unauthorized connections to potentially harmful servers.
CVE-2019-1003058 can be exploited by attackers who can perform cross-site request forgery attacks against Jenkins instances using the FTP Publisher Plugin.