CVE-2018-1999026Server-Side Request Forgery in Jenkins Tracetronic Ecu-test

Severity
6.5MEDIUMNVD
EPSS
0.0%
top 91.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 1
Latest updateMay 14

Description

A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java that allows attackers to have Jenkins send HTTP requests to an attacker-specified host.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages1 packages

🔴Vulnerability Details

3
OSV
Jenkins TraceTronic ECU-TEST Plugin server-side request forgery vulnerability2022-05-14
GHSA
Jenkins TraceTronic ECU-TEST Plugin server-side request forgery vulnerability2022-05-14
CVEList
CVE-2018-1999026: A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 22018-08-01

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2018-07-302018-07-30
CVE-2018-1999026 — Server-Side Request Forgery | cvebase