Permission Check Flaw in Jenkins Deploy WebLogic Plugin
CVE-2019-10465

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
23 October 2019

Summary

In the Jenkins Deploy WebLogic Plugin, a security flaw arises due to the absence of a proper permission check. This allows users with Overall/Read permissions to initiate connections to arbitrary URLs using specified credentials. Furthermore, it enables attackers to ascertain the existence of a directory or file located at a predicated path within the Jenkins master’s file system, thereby exposing sensitive information.

Affected Version(s)

Jenkins Deploy WebLogic Plugin 4.1 and earlier

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.