Server-Side Request Forgery Vulnerability in Jenkins OctopusDeploy Plugin
CVE-2019-1003027

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
20 February 2019

Summary

A server-side request forgery vulnerability exists in the Jenkins OctopusDeploy Plugin versions 1.8.1 and earlier. This flaw allows authenticated users with Overall/Read permission to manipulate Jenkins into making requests to attacker-defined URLs. If the request is successful, the attacker can obtain the HTTP response code; if it fails, an exception error message is returned, potentially revealing sensitive information or service details.

Affected Version(s)

Jenkins OctopusDeploy Plugin 1.8.1 and earlier

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.