An information exposure and denial of service vulnerability exists in Jenkins Token Macro Plugin 2.5 and earlier in src/main/java/org/jenkinsci/plugins/tokenmacro/Parser.java, src/main/java/org/jenkinsci/plugins/tokenmacro/TokenMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/AbstractChangesSinceMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ChangesSinceLastBuildMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ProjectUrlMacro.java that allows attackers with the ability to control token macro input (such as SCM changelogs) to define recursive input that results in unexpected macro evaluation.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHBA-2019:0326 | Third Party Advisory |
https://access.redhat.com/errata/RHBA-2019:0327 | Third Party Advisory |
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1102 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jenkins
Published: 2019-02-06T16:00:00
Updated: 2023-10-24T16:44:42.864Z
Reserved: 2019-02-06T00:00:00
Link: CVE-2019-1003011
JSON object: View
NVD Information
Status : Modified
Published: 2019-02-06T16:29:00.623
Modified: 2023-10-25T18:16:01.733
Link: CVE-2019-1003011
JSON object: View
Redhat Information
No data.
CWE