First published: Tue Dec 17 2019(Updated: )
A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Build Failure Analyzer | <=1.24.1 | |
maven/com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer | <1.24.2 | 1.24.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16554 is a vulnerability in the Jenkins Build Failure Analyzer Plugin that allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression.
The severity of CVE-2019-16554 is medium (4.3).
CVE-2019-16554 affects Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier versions.
To fix CVE-2019-16554, users should update to version 1.24.2 of the Jenkins Build Failure Analyzer Plugin.
More information about CVE-2019-16554 can be found at the following references: [http://www.openwall.com/lists/oss-security/2019/12/17/1](http://www.openwall.com/lists/oss-security/2019/12/17/1), [https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651](https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651), [https://nvd.nist.gov/vuln/detail/CVE-2019-16554](https://nvd.nist.gov/vuln/detail/CVE-2019-16554)