First published: Tue Dec 17 2019(Updated: )
A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Gerrit Trigger | <=2.30.1 | |
maven/com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger | <2.30.2 | 2.30.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16552 is considered a medium severity vulnerability due to its potential impact on system integrity.
To fix CVE-2019-16552, upgrade the Jenkins Gerrit Trigger Plugin to version 2.30.2 or later.
CVE-2019-16552 affects users of Jenkins Gerrit Trigger Plugin versions 2.30.1 and earlier.
CVE-2019-16552 allows attackers with Overall/Read permission to connect to unauthorized HTTP URLs or SSH servers.
Exploitation of CVE-2019-16552 can lead to unauthorized access and information disclosure on the Jenkins master.