First published: Wed Oct 16 2019(Updated: )
A missing permission check in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Crx Content Package Deployer | <=1.8.1 | |
maven/org.jenkins-ci.plugins:crx-content-package-deployer | <1.9 | 1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10438 is classified as a high severity vulnerability due to its potential to expose sensitive credentials.
To fix CVE-2019-10438, upgrade the Jenkins CRX Content Package Deployer Plugin to version 1.9 or higher.
The impacts of CVE-2019-10438 include unauthorized access to credentials stored within Jenkins, leading to potential compromise of systems.
CVE-2019-10438 affects instances of Jenkins running the CRX Content Package Deployer Plugin version 1.8.1 and earlier.
CVE-2019-10438 is a missing permission check vulnerability that allows attackers to exploit permissions to access attacker-specified URLs.