First published: Thu Apr 04 2019(Updated: )
A missing permission check in Jenkins FTP publisher Plugin in the FTPPublisher.DescriptorImpl#doLoginCheck method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ftp Publisher | ||
maven/org.jvnet.hudson.plugins:ftppublisher | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003059 has a medium severity rating due to the potential for unauthorized connections to specified servers.
To address CVE-2019-1003059, update the Jenkins FTP Publisher Plugin to version 1.3 or later.
CVE-2019-1003059 affects the FTP Publisher Plugin for Jenkins versions up to 1.2.
Yes, CVE-2019-1003059 can be exploited remotely by any attacker with Overall/Read permission.
The implications of CVE-2019-1003059 include unauthorized access to initiate FTP connections to malicious servers.