CVE-2019-10392

Severity
8.8HIGH
EPSS
80.8%
top 0.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 12
Latest updateMay 24

Description

Jenkins Git Client Plugin 2.8.4 and earlier and 3.0.0-rc did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5jenkins_project/jenkins_git_client_plugin2.8.4 and earlier, 3.0.0-rc
NVDjenkins/git_client2.8.4+1

🔴Vulnerability Details

3
OSV
Improper Neutralization of Special Elements used in an OS Command in Jenkins Git Client Plugin2022-05-24
GHSA
Improper Neutralization of Special Elements used in an OS Command in Jenkins Git Client Plugin2022-05-24
CVEList
CVE-2019-10392: Jenkins Git Client Plugin 22019-09-12

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2019-09-122019-09-12
Red Hat
jenkins-git-client-plugin: OS command injection via 'git ls-remote'2019-09-12

💬Community

2
Bugzilla
CVE-2019-10392 jenkins-git-client-plugin: OS command injection via 'git ls-remote'2020-04-01
Bugzilla
CVE-2018-10392 libvorbis: heap buffer overflow in mapping0_forward function2018-05-02
CVE-2019-10392 (HIGH CVSS 8.8) | Jenkins Git Client Plugin 2.8.4 and | cvebase.io