Description
A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5170 | A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not. |
Github GHSA |
GHSA-rgmj-mccj-h9mx | Cross-Site Request Forgery in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:46.757Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-1000195
No data.
Status : Modified
Published: 2018-06-05T21:29:00.617
Modified: 2024-11-21T03:39:54.457
Link: CVE-2018-1000195
OpenCVE Enrichment
No data.
EUVD
Github GHSA