Arbitrary File Read Vulnerability in Jenkins Google OAuth Credentials Plugin by Jenkins
CVE-2019-10436
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 16 October 2019
Summary
An arbitrary file read vulnerability exists in the Google OAuth Credentials Plugin for Jenkins, prior to version 0.9. This flaw permits attackers who can configure jobs and credentials within Jenkins to access and retrieve the contents of any file stored on the Jenkins master. By exploiting this vulnerability, unauthorized users may gain access to sensitive information, potentially compromising the integrity and security of the Jenkins environment.
Affected Version(s)
Jenkins Google OAuth Credentials Plugin 0.9 and earlier
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved