First published: Tue Jun 11 2019(Updated: )
CloudBees CD Plugin unconditionally disabled SSL/TLS certificate validation for the entire Jenkins controller JVM during the deployment/publication of an application. CloudBees CD Plugin no longer does that. Instead, the existing opt-in option to ignore SSL/TLS errors is used during deployment for the specific connection. This issue was caused by an incomplete fix for [SECURITY-937](https://www.jenkins.io/security/advisory/2019-02-19/#SECURITY-937).
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:electricflow | <=1.1.6 | 1.1.7 |
Jenkins ElectricFlow | <=1.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10334 is a vulnerability found in the Jenkins ElectricFlow Plugin that disabled SSL/TLS and hostname verification globally.
CVE-2019-10334 affects CloudBees CD Plugin as it unconditionally disables SSL/TLS certificate validation for the entire Jenkins controller JVM during deployment/publication of an application.
CVE-2019-10334 has a severity of medium with a CVSS score of 6.5.
To fix CVE-2019-10334, update your CloudBees CD Plugin to version 1.1.7 or higher.
You can find more information about CVE-2019-10334 at the following references: [http://www.openwall.com/lists/oss-security/2019/06/11/1](http://www.openwall.com/lists/oss-security/2019/06/11/1), [http://www.securityfocus.com/bid/108747](http://www.securityfocus.com/bid/108747), [https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411](https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411).