mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
72 lines
2.3 KiB
JSON
72 lines
2.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2019-10330",
|
|
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Jenkins project",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Jenkins Gitea Plugin",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.1.1 and earlier"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Jenkins Gitea Plugin 1.1.1 and earlier did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-693"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins",
|
|
"url": "http://www.openwall.com/lists/oss-security/2019/05/31/2"
|
|
},
|
|
{
|
|
"refsource": "BID",
|
|
"name": "108540",
|
|
"url": "http://www.securityfocus.com/bid/108540"
|
|
},
|
|
{
|
|
"url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046",
|
|
"refsource": "CONFIRM",
|
|
"name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046"
|
|
}
|
|
]
|
|
}
|
|
} |