Permission Check Flaw in Jenkins Kmap Plugin Affects User Security
CVE-2019-10293
6.5MEDIUM
Summary
A missing permission check in the Jenkins Kmap Plugin's form validation methods allows users with Overall/Read permissions to connect to malicious servers. This flaw could lead to unauthorized actions and potential data compromise by enabling attackers to leverage the plugin’s functionalities for nefarious purposes.
Affected Version(s)
Jenkins Kmap Plugin all versions as of 2019-04-03
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved