A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2019/12/17/1 | Mailing List Third Party Advisory | 
| https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371 | Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2019/12/17/1 | Mailing List Third Party Advisory | 
| https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371 | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:30
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2019/12/17/1 - Mailing List, Third Party Advisory | |
| References | () https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371 - Vendor Advisory | 
Information
                Published : 2019-12-17 15:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16559
Mitre link : CVE-2019-16559
CVE.ORG link : CVE-2019-16559
JSON object : View
Products Affected
                jenkins
- websphere_deployer
 
CWE
                
                    
                        
                        CWE-276
                        
            Incorrect Default Permissions
