First published: Wed Jul 31 2019(Updated: )
Missing permission checks in Jenkins Configuration as Code Plugin 1.24 and earlier in various HTTP endpoints allowed users with Overall/Read access to access the generated schema and documentation for this plugin containing detailed information about installed plugins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Configuration As Code | <=1.24 | |
maven/io.jenkins:configuration-as-code | <=1.24 | 1.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10344 has a medium severity impact due to missing permission checks allowing unauthorized access to sensitive configuration details.
To fix CVE-2019-10344, upgrade the Jenkins Configuration as Code Plugin to version 1.25 or later.
CVE-2019-10344 allows users with Overall/Read access to view the generated schema and documentation of the plugin.
Versions of Jenkins Configuration as Code from 1.24 and earlier are affected by CVE-2019-10344.
CVE-2019-10344 does not directly impact data integrity, but it exposes sensitive configuration information.