Skip to content

Jenkins TraceTronic ECU-TEST Plugin server-side request forgery vulnerability

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Jan 9, 2024

Package

maven de.tracetronic.jenkins.plugins:ecutest (Maven)

Affected versions

<= 2.3

Patched versions

2.4

Description

A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java that allows attackers to have Jenkins send HTTP requests to an attacker-specified host.

References

Published by the National Vulnerability Database Aug 1, 2018
Published to the GitHub Advisory Database May 14, 2022
Last updated Jan 9, 2024
Reviewed Jan 9, 2024

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2018-1999026

GHSA ID

GHSA-hp7x-282p-hhr9
Checking history
See something to contribute? Suggest improvements for this vulnerability.