First published: Wed Jul 17 2019(Updated: )
A vulnerability in the Stapler web framework used in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier allowed attackers to access view fragments directly, bypassing permission checks and possibly obtain sensitive information.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.kohsuke.stapler:stapler-parent | <1.257.1 | 1.257.1 |
maven/org.jenkins-ci.main:jenkins-core | >=2.177<=2.185 | 2.186 |
maven/org.jenkins-ci.main:jenkins-core | <=2.176.1 | 2.176.2 |
redhat/jenkins weekly | <2.186 | 2.186 |
redhat/Jenkins LTS | <2.176.2 | 2.176.2 |
Jenkins Jenkins | <=2.176.1 | |
Jenkins Jenkins | <=2.185 | |
Red Hat OpenShift Container Platform | =3.11 | |
Red Hat OpenShift Container Platform | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10354 is classified as a high severity vulnerability.
To fix CVE-2019-10354, you should upgrade to Jenkins version 2.186 or Stapler version 1.257.1.
CVE-2019-10354 affects Jenkins versions 2.185 and earlier, as well as LTS versions 2.176.1 and earlier.
Yes, CVE-2019-10354 allows attackers to bypass permission checks, potentially leading to sensitive information exposure.
Yes, the Stapler web framework used in Jenkins is the specific package associated with CVE-2019-10354.