Moderate severityNVD Advisory· Published Mar 8, 2019· Updated Aug 5, 2024
CVE-2019-1003035
CVE-2019-1003035
Description
An information exposure vulnerability exists in Jenkins Azure VM Agents Plugin 0.8.0 and earlier in src/main/java/com/microsoft/azure/vmagent/AzureVMAgentTemplate.java, src/main/java/com/microsoft/azure/vmagent/AzureVMCloud.java that allows attackers with Overall/Read permission to perform the 'verify configuration' form validation action, thereby obtaining limited information about the Azure configuration.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:azure-vm-agentsMaven | < 0.8.1 | 0.8.1 |
Affected products
1- Range: 0.8.0 and earlier
Patches
191bfc7d95ae1[SECURITY-1330]
2 files changed · +6 −0
src/main/java/com/microsoft/azure/vmagent/AzureVMAgentTemplate.java+3 −0 modified@@ -55,6 +55,7 @@ import org.kohsuke.stapler.AncestorInPath; import org.kohsuke.stapler.DataBoundConstructor; import org.kohsuke.stapler.QueryParameter; +import org.kohsuke.stapler.interceptor.RequirePOST; import javax.servlet.ServletException; import javax.xml.bind.DatatypeConverter; @@ -1234,6 +1235,7 @@ public FormValidation doCheckJvmOptions(@QueryParameter String value) { return FormValidation.ok(); } + @RequirePOST public FormValidation doVerifyConfiguration( @RelativePath("..") @QueryParameter String azureCredentialsId, @RelativePath("..") @QueryParameter String resourceGroupReferenceType, @@ -1269,6 +1271,7 @@ public FormValidation doVerifyConfiguration( @QueryParameter String nsgName, @QueryParameter String jvmOptions, @QueryParameter String imageReferenceType) { + Jenkins.getInstance().checkPermission(Jenkins.ADMINISTER); /* imageReferenceType will not be passed to doVerifyConfiguration
src/main/java/com/microsoft/azure/vmagent/AzureVMCloud.java+3 −0 modified@@ -63,6 +63,7 @@ import org.kohsuke.stapler.AncestorInPath; import org.kohsuke.stapler.DataBoundConstructor; import org.kohsuke.stapler.QueryParameter; +import org.kohsuke.stapler.interceptor.RequirePOST; import javax.servlet.ServletException; import java.io.IOException; @@ -1073,13 +1074,15 @@ public String getDefaultResourceGroupName() { return Constants.DEFAULT_RESOURCE_GROUP_NAME; } + @RequirePOST public FormValidation doVerifyConfiguration( @QueryParameter String azureCredentialsId, @QueryParameter String maxVirtualMachinesLimit, @QueryParameter String deploymentTimeout, @QueryParameter String resourceGroupReferenceType, @QueryParameter String newResourceGroupName, @QueryParameter String existingResourceGroupName) { + Jenkins.getInstance().checkPermission(Jenkins.ADMINISTER); String resourceGroupName = getResourceGroupName( resourceGroupReferenceType, newResourceGroupName, existingResourceGroupName);
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-3hg6-c7f8-3348ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-1003035ghsaADVISORY
- www.securityfocus.com/bid/107476ghsavdb-entryx_refsource_BIDWEB
- github.com/jenkinsci/azure-vm-agents-plugin/commit/91bfc7d95ae1349ce2a8b6b7e73155848fdc1d82ghsaWEB
- jenkins.io/security/advisory/2019-03-06/ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.