Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:jenkins:job_import:*:*:*:*:*:jenkins:*:*", "matchCriteriaId": "DA81E155-05B4-4FE7-B0AA-C3EDF73D5189", "versionEndIncluding": "2.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An XML external entity processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, perform a denial of service attack, etc."}, {"lang": "es", "value": "Existe una vulnerabilidad de procesamiento de entidades externas XML en Jenkins Job Import Plugin, en versiones 2.1 y anteriores, en src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java, que permite que los atacantes con capacidad para controlar el servidor HTTP (Jenkins) en \"query\" para prepararse para una importaci\u00f3n de trabajo lean archivos arbitrarios, realicen una denegaci\u00f3n de servicio (DoS), etc."}], "id": "CVE-2019-1003015", "lastModified": "2024-11-21T04:17:44.650", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-02-06T16:29:00.780", "references": [{"source": "jenkinsci-cert@googlegroups.com", "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20%281%29"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20%281%29"}], "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-611"}], "source": "nvd@nist.gov", "type": "Primary"}]}