CRITICAL · 9.3

CVE-2019-10309

Jenkins Self-Organizing Swarm Plug-in Modules Plugin clients that use UDP broadcasts to discover Jenkins masters do not prevent XML External Entity processing when processing the responses, allowing u...

Vulnerability Description

Jenkins Self-Organizing Swarm Plug-in Modules Plugin clients that use UDP broadcasts to discover Jenkins masters do not prevent XML External Entity processing when processing the responses, allowing unauthorized attackers on the same network to read arbitrary files from Swarm clients.

CVSS Score

9.3

CRITICAL

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
JenkinsSelf-Organizing Swarm Modules-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-10309?

CVE-2019-10309 is a vulnerability with a CVSS score of 9.3 (CRITICAL). Jenkins Self-Organizing Swarm Plug-in Modules Plugin clients that use UDP broadcasts to discover Jenkins masters do not prevent XML External Entity processing when processing the responses, allowing u...

How severe is CVE-2019-10309?

CVE-2019-10309 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2019-10309?

Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Self-Organizing Swarm Modules.