First published: Tue Jun 11 2019(Updated: )
Missing permission checks in Jenkins ElectricFlow Plugin 1.1.5 and earlier in various HTTP endpoints allowed users with Overall/Read access to obtain information about the Jenkins ElectricFlow Plugin configuration and configuration of connected ElectricFlow instances.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Electricflow | <=1.1.5 | |
maven/org.jenkins-ci.plugins:electricflow | <=1.1.6 | 1.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-10333 is medium with a CVSS score of 4.3.
The affected software for CVE-2019-10333 is Jenkins ElectricFlow Plugin version 1.1.5 and earlier.
CVE-2019-10333 allows attackers with Overall/Read access to obtain information about the configuration of CloudBees CD Plugin, as well as the configuration and data of connected ElectricFlow servers.
Yes, the references for CVE-2019-10333 are: http://www.openwall.com/lists/oss-security/2019/06/11/1, http://www.securityfocus.com/bid/108747, and https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2).
The Common Weakness Enumeration (CWE) ID for CVE-2019-10333 is CWE-862 and CWE-285.