First published: Wed Jul 31 2019(Updated: )
A missing permission check in Jenkins Pipeline: Shared Groovy Libraries Plugin 2.14 and earlier allowed users with Overall/Read access to obtain limited information about the content of SCM repositories referenced by global libraries.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins.workflow:workflow-cps-global-lib | <=2.14 | 2.15 |
redhat/jenkins-plugin-workflow-cps-global-lib | <2.15 | 2.15 |
Jenkins Pipeline | <=2.14 | |
Red Hat OpenShift Container Platform | =3.11 | |
Red Hat OpenShift Container Platform | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10357 has a medium severity rating due to a missing permission check that could allow unauthorized access to SCM repository information.
To fix CVE-2019-10357, upgrade the Jenkins Pipeline: Shared Groovy Libraries Plugin to version 2.15 or later.
CVE-2019-10357 affects Jenkins Pipeline: Shared Groovy Libraries Plugin version 2.14 and earlier, as well as certain versions of Red Hat OpenShift Container Platform.
CVE-2019-10357 is a permissions-related vulnerability that allows users to access limited information in SCM repositories.
Mitigation options are limited; the recommended action is to upgrade the affected plugin to avoid risk.