[Forgot Password]
Login  Register Subscribe

24547

 
 

132176

 
 

122862

 
 

909

 
 

101125

 
 

148

Paid content will be excluded from the download.


Download | Alert*
OVAL

Server-side request forgery vulnerability in Git Client Plugin in Jenkins

ID: oval:org.secpod.oval:def:47390Date: (C)2018-09-10   (M)2018-09-10
Class: VULNERABILITYFamily: windows




The host is installed with Git Client Plugin before 3.9.0 and is prone to a Server-side request forgery vulnerability. A flaw is present in the application, which fails to properly handle issues in the AssemblaWeb.java component. Successful exploitation could allow attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

Platform:
Microsoft Windows 10
Microsoft Windows Server 2008
Microsoft Windows XP
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2003
Microsoft Windows 8.1
Microsoft Windows 7
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2
Microsoft Windows Vista
Microsoft Windows 8
Microsoft Windows Server 2012
Product:
Git Client Plugin for Jenkins
Reference:
CVE-2018-1000182
CVE    1
CVE-2018-1000182
CPE    1
cpe:/a:jenkins:git-client-plugin

© SecPod Technologies