First published: Wed Aug 07 2019(Updated: )
A missing permission check in Jenkins Relution Enterprise Appstore Publisher Plugin 1.24 and earlier allows attackers to have Jenkins initiate an HTTP connection to an attacker-specified server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Relution Enterprise Appstore Publisher | <=1.24 | |
maven/org.jenkins-ci.plugins:relution-publisher | <=1.24 | |
<=1.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-10389 is medium, with a severity value of 4.3.
CVE-2019-10389 is a vulnerability in Jenkins Relution Enterprise Appstore Publisher Plugin that allows attackers to have Jenkins initiate an HTTP connection to an attacker-specified server.
The affected software for CVE-2019-10389 is Jenkins Relution Enterprise Appstore Publisher Plugin version 1.24 and earlier.
Yes, there are reference URLs available for CVE-2019-10389, including http://www.openwall.com/lists/oss-security/2019/08/07/1 and https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053.
The Common Weakness Enumerations (CWEs) associated with CVE-2019-10389 are CWE-862 and CWE-285.