First published: Wed Oct 23 2019(Updated: )
A missing permission check in Jenkins Dynatrace Application Monitoring Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Dynatrace Application Monitoring | <=2.1.4 | |
maven/org.jenkins-ci.plugins:dynatrace-dashboard | <2.1.5 | 2.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10463 is rated as a medium severity vulnerability.
To fix CVE-2019-10463, upgrade the Jenkins Dynatrace Application Monitoring plugin to version 2.1.5 or later.
Users of Jenkins with the Dynatrace Application Monitoring plugin version up to 2.1.4 are impacted by CVE-2019-10463.
CVE-2019-10463 is a permission check vulnerability that allows unauthorized connection to attacker-specified URLs.
Attackers can exploit CVE-2019-10463 to connect to an attacker-specified URL using attacker-specified credentials if they have Overall/Read permission.