First published: Thu Apr 04 2019(Updated: )
A missing permission check in Jenkins Audit to Database Plugin in the DbAuditPublisherDescriptorImpl#doTestJdbcConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Audit To Database | ||
maven/org.jenkins-ci.plugins:audit2db | <=0.5 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1003077 is classified as medium.
To fix CVE-2019-1003077, update the Jenkins Audit to Database Plugin to version 0.5 or later.
Any Jenkins instance using the Audit to Database Plugin version 0.5 or earlier is affected by CVE-2019-1003077.
CVE-2019-1003077 can allow attackers with Overall/Read permission to initiate unauthorized database connections.
Yes, CVE-2019-1003077 requires the attacker to have Overall/Read permission to exploit the vulnerability.