Jenkins Gitea Plugin Vulnerability Exposes Jenkinsfiles to Untrusted Modifications
CVE-2019-10330
7.5HIGH
Summary
The Jenkins Gitea Plugin prior to version 1.1.1 lacks proper implementation of trusted revisions. This oversight allows attackers, even those without commit access to the Git repository, to modify Jenkinsfiles. Such changes could threaten the integrity of pipeline configurations, posing a risk to the build and deployment processes, particularly in sensitive environments where Jenkins is configured to consider these files untrusted.
Affected Version(s)
Jenkins Gitea Plugin 1.1.1 and earlier
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved