First published: Tue Apr 30 2019(Updated: )
Jenkins Self-Organizing Swarm Plug-in Modules Plugin clients that use UDP broadcasts to discover Jenkins masters do not prevent XML External Entity processing when processing the responses, allowing unauthorized attackers on the same network to read arbitrary files from Swarm clients.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Self-organizing Swarm Modules | ||
maven/org.jenkins-ci.plugins:swarm | <=3.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10309 has a medium severity, as it allows unauthorized access to sensitive files on Jenkins Swarm clients.
To fix CVE-2019-10309, upgrade the Jenkins Self-Organizing Swarm Plug-in Modules Plugin to version 3.16 or later.
Any Jenkins users employing the Self-Organizing Swarm Plug-in Modules Plugin version up to and including 3.15 are affected by CVE-2019-10309.
CVE-2019-10309 allows attackers on the same network to exploit XML External Entity processing vulnerabilities to read arbitrary files.
CVE-2019-10309 operates by using UDP broadcasts to discover Jenkins masters and failing to prevent XML External Entity processing in the responses.