Permission Check Flaw in Jenkins Deploy WebLogic Plugin
CVE-2019-10465
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 23 October 2019
Summary
In the Jenkins Deploy WebLogic Plugin, a security flaw arises due to the absence of a proper permission check. This allows users with Overall/Read permissions to initiate connections to arbitrary URLs using specified credentials. Furthermore, it enables attackers to ascertain the existence of a directory or file located at a predicated path within the Jenkins master’s file system, thereby exposing sensitive information.
Affected Version(s)
Jenkins Deploy WebLogic Plugin 4.1 and earlier
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved