First published: Tue Jun 11 2019(Updated: )
A missing permission check in a form validation method in CloudBees CD Plugin allowed users with Overall/Read permission to initiate a connection test to an attacker-specified server with attacker-specified username and password. Additionally, the form validation method did not require POST requests, resulting in a CSRF vulnerability. This form validation method now requires POST requests and Overall/Administer permissions.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:electricflow | <=1.1.6 | 1.1.7 |
Jenkins ElectricFlow | <=1.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-10332.
The affected software is Jenkins ElectricFlow Plugin.
The severity level of CVE-2019-10332 is medium with a severity value of 4.3.
Attackers with Overall/Read permission can initiate a connection test to an attacker-specified server with an attacker-specified username and password.
Yes, the vulnerability can be fixed by updating to version 1.1.6 or later.