Regular Expression Processing Vulnerability in Jenkins Build Failure Analyzer Plugin
CVE-2019-16555

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
17 December 2019

Summary

A vulnerability exists in the Jenkins Build Failure Analyzer Plugin where user-supplied regular expressions can be processed in an uninterruptible manner. This can allow attackers to exploit the inability to interrupt the evaluation of the regular expression, which may lead to performance issues and potential Denial of Service conditions. The affected versions include Build Failure Analyzer Plugin 1.24.1 and earlier, necessitating immediate attention and remediation by users to mitigate risks.

Affected Version(s)

Jenkins Build Failure Analyzer Plugin <= 1.24.1

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.