Server-Side Request Forgery Vulnerability in Jenkins OctopusDeploy Plugin
CVE-2019-1003027
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 20 February 2019
Summary
A server-side request forgery vulnerability exists in the Jenkins OctopusDeploy Plugin versions 1.8.1 and earlier. This flaw allows authenticated users with Overall/Read permission to manipulate Jenkins into making requests to attacker-defined URLs. If the request is successful, the attacker can obtain the HTTP response code; if it fails, an exception error message is returned, potentially revealing sensitive information or service details.
Affected Version(s)
Jenkins OctopusDeploy Plugin 1.8.1 and earlier
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved