Jenkins Koji Plugin Vulnerability Impacts SSL/TLS Security and Hostname Verification
CVE-2019-10314

5.9MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
30 April 2019

What is CVE-2019-10314?

The Jenkins Koji Plugin poses a significant security risk by disabling SSL/TLS and hostname verification for the Jenkins master JVM. This configuration flaw can result in unencrypted communications, making the system susceptible to man-in-the-middle attacks and unauthorized access to sensitive data. Users of the Jenkins Koji Plugin must ensure proper security configurations are in place to mitigate these risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins Koji Plugin 0.3 and earlier

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.