Moderate severityNVD Advisory· Published Feb 20, 2019· Updated Aug 5, 2024
CVE-2019-1003026
CVE-2019-1003026
Description
A server-side request forgery vulnerability exists in Jenkins Mattermost Notification Plugin 2.6.2 and earlier in MattermostNotifier.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified Mattermost server and room and send a message.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:mattermostMaven | < 2.6.3 | 2.6.3 |
Affected products
1- Range: 2.6.2 and earlier
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-wxj2-qc9p-65r3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-1003026ghsaADVISORY
- www.securityfocus.com/bid/107295ghsavdb-entryx_refsource_BIDWEB
- jenkins.io/security/advisory/2019-02-19/ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.