CVE-2019-1003028

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-1003028
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1003028.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-1003028
Aliases
Published
2019-02-20T21:29:00Z
Modified
2024-09-03T02:21:12.024394Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint.

References

Affected packages

Git / github.com/jenkinsci/jms-messaging-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/jms-messaging-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

jms-messaging-1.*

jms-messaging-1.0.0
jms-messaging-1.0.1
jms-messaging-1.0.10
jms-messaging-1.0.11
jms-messaging-1.0.12
jms-messaging-1.0.13
jms-messaging-1.0.14
jms-messaging-1.0.15
jms-messaging-1.0.16
jms-messaging-1.0.17
jms-messaging-1.0.18
jms-messaging-1.0.19
jms-messaging-1.0.2
jms-messaging-1.0.20
jms-messaging-1.0.21
jms-messaging-1.0.22
jms-messaging-1.0.23
jms-messaging-1.0.24
jms-messaging-1.0.25
jms-messaging-1.0.26
jms-messaging-1.0.27
jms-messaging-1.0.28
jms-messaging-1.0.29
jms-messaging-1.0.3
jms-messaging-1.0.30
jms-messaging-1.0.31
jms-messaging-1.0.32
jms-messaging-1.0.33
jms-messaging-1.0.34
jms-messaging-1.0.35
jms-messaging-1.0.36
jms-messaging-1.0.37
jms-messaging-1.0.38
jms-messaging-1.0.39
jms-messaging-1.0.4
jms-messaging-1.0.40
jms-messaging-1.0.5
jms-messaging-1.0.6
jms-messaging-1.0.7
jms-messaging-1.0.8
jms-messaging-1.0.9
jms-messaging-1.1.0
jms-messaging-1.1.1