First published: Tue Dec 17 2019(Updated: )
A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Websphere Deployer | <=1.6.1 | |
maven/org.jenkins-ci.plugins:websphere-deployer | <=1.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-16559 is medium with a CVSS score of 5.4.
The affected software of CVE-2019-16559 is Jenkins WebSphere Deployer Plugin 1.6.1 and earlier.
Yes, CVE-2019-16559 has a missing permission check in methods performing form validation.
Users with Overall/Read access in CVE-2019-16559 can perform connection tests and determine the existence of files on the Jenkins controller file system.
Yes, you can find additional information about CVE-2019-16559 at the following references: [http://www.openwall.com/lists/oss-security/2019/12/17/1](http://www.openwall.com/lists/oss-security/2019/12/17/1), [https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371](https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371), [https://nvd.nist.gov/vuln/detail/CVE-2019-16559](https://nvd.nist.gov/vuln/detail/CVE-2019-16559).