First published: Thu Apr 18 2019(Updated: )
A missing permission check in Jenkins XebiaLabs XL Deploy Plugin in the Credential#doValidateUserNamePassword form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Xebialabs Xl Deploy | <=7.5.3 | |
maven/com.xebialabs.deployit.ci:deployit-plugin | <7.5.5 | 7.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10305 has a medium severity rating due to its potential for unauthorized access.
To resolve CVE-2019-10305, upgrade Jenkins XebiaLabs XL Deploy Plugin to version 7.5.5 or later.
CVE-2019-10305 affects users of Jenkins with the XebiaLabs XL Deploy Plugin versions prior to 7.5.5.
An attacker can exploit CVE-2019-10305 to connect to an arbitrary server if they have Overall/Read permission.
Currently, the only effective workaround for CVE-2019-10305 is to upgrade to the corrected version of the plugin.