Server-Side Request Forgery in Jenkins TraceTronic ECU-TEST Plugin
CVE-2018-1999026
6.5MEDIUM
Summary
A server-side request forgery vulnerability exists in the Jenkins TraceTronic ECU-TEST Plugin version 2.3 and earlier. This flaw allows attackers to exploit Jenkins by having it send HTTP requests to any specified host, potentially leading to unauthorized information disclosure or other malicious actions.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved