Description
A server-side request forgery vulnerability exists in Jenkins GitHub Branch Source Plugin 2.3.4 and older in Endpoint.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3351 | A server-side request forgery vulnerability exists in Jenkins GitHub Branch Source Plugin 2.3.4 and older in Endpoint.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL. |
Github GHSA |
GHSA-9cfq-v2hm-c3xr | Jenkins GitHub Branch Source Plugin vulnerable to Server-Side Request Forgery |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T22:14:09.790Z
Reserved: 2018-06-05T00:00:00.000Z
Link: CVE-2018-1000185
No data.
Status : Modified
Published: 2018-06-05T20:29:00.513
Modified: 2024-11-21T03:39:52.850
Link: CVE-2018-1000185
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA