Permission Check Flaw in Jenkins Kmap Plugin Affects User Security
CVE-2019-10293

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
4 April 2019

Summary

A missing permission check in the Jenkins Kmap Plugin's form validation methods allows users with Overall/Read permissions to connect to malicious servers. This flaw could lead to unauthorized actions and potential data compromise by enabling attackers to leverage the plugin’s functionalities for nefarious purposes.

Affected Version(s)

Jenkins Kmap Plugin all versions as of 2019-04-03

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.