Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1000195

Опубликовано: 09 мая 2018
Источник: redhat
CVSS3: 3.5
EPSS Низкий

Описание

A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 3jenkinsAffected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=1576712jenkins: Users with Overall/Read permission were able to send GET requests to any URL (SECURITY-794)

EPSS

Процентиль: 71%
0.00695
Низкий

3.5 Low

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
больше 7 лет назад

A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.

CVSS3: 4.3
debian
больше 7 лет назад

A server-side request forgery vulnerability exists in Jenkins 2.120 an ...

CVSS3: 4.3
github
больше 3 лет назад

Cross-Site Request Forgery in Jenkins

EPSS

Процентиль: 71%
0.00695
Низкий

3.5 Low

CVSS3