cvelist/2019/10xxx/CVE-2019-10375.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2019-03-29 13:00:44 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2019-10375",
2019-08-07 15:00:56 +00:00
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
2019-08-07 16:14:02 +02:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins File System SCM Plugin",
"version": {
"version_data": [
{
"version_value": "2.1 and earlier"
}
]
}
}
]
}
}
]
}
2019-03-29 13:00:44 +00:00
},
2019-08-07 16:14:02 +02:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-03-29 13:00:44 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2019-08-07 16:14:02 +02:00
"value": "An arbitrary file read vulnerability in Jenkins File System SCM Plugin 2.1 and earlier allows attackers able to configure jobs in Jenkins to obtain the contents of any file on the Jenkins master."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
2019-08-07 18:00:52 +00:00
{
"refsource": "MLIST",
"name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/08/07/1"
2019-09-19 15:01:17 +00:00
},
{
"url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569",
"refsource": "CONFIRM",
"name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569"
2019-03-29 13:00:44 +00:00
}
]
}
}