cvelist/2019/10xxx/CVE-2019-10330.json

72 lines
2.3 KiB
JSON
Raw Normal View History

2019-03-29 13:00:58 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2019-10330",
2019-05-31 15:00:54 +00:00
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins Gitea Plugin",
"version": {
"version_data": [
{
"version_value": "1.1.1 and earlier"
}
]
}
}
]
}
}
]
}
2019-03-29 13:00:58 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-03-29 13:00:58 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins Gitea Plugin 1.1.1 and earlier did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-693"
}
]
}
]
},
"references": {
"reference_data": [
2019-05-31 18:00:50 +00:00
{
"refsource": "MLIST",
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/05/31/2"
2019-06-03 13:00:49 +00:00
},
{
"refsource": "BID",
"name": "108540",
"url": "http://www.securityfocus.com/bid/108540"
2019-09-19 15:01:17 +00:00
},
{
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046",
"refsource": "CONFIRM",
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046"
2019-03-29 13:00:58 +00:00
}
]
}
}