Description
A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5170 | A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not. |
Github GHSA |
GHSA-rgmj-mccj-h9mx | Cross-Site Request Forgery in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:46.757Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-1000195
No data.
Status : Modified
Published: 2018-06-05T21:29:00.617
Modified: 2024-11-21T03:39:54.457
Link: CVE-2018-1000195
OpenCVE Enrichment
No data.
EUVD
Github GHSA