A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-3873 A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint.
Github GHSA Github GHSA GHSA-g3gj-632x-fhrh SSRF vulnerability due to missing permission check in Jenkins JMS Messaging Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-05T03:00:19.318Z

Reserved: 2019-02-20T00:00:00

Link: CVE-2019-1003028

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-20T21:29:00.490

Modified: 2024-11-21T04:17:46.087

Link: CVE-2019-1003028

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.