| |
Vulnerability CVE-2019-1003015
Published: 2019-02-06
Description: |
An XML external entity processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, perform a denial of service attack, etc. |
Type:
CWE-611 (Information Exposure Through XML External Entity Reference)
CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
6.4/10 |
4.9/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
None |
Partial |
References: |
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20(1 )
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|