Description
A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java that allows attackers to have Jenkins send HTTP requests to an attacker-specified host.
Remediation
References
http://www.securityfocus.com/bid/104960
https://jenkins.io/security/advisory/2018-07-30/#SECURITY-994
Related Vulnerabilities
CVE-2019-10367 Vulnerability in maven package io.jenkins:configuration-as-code
CVE-2022-41252 Vulnerability in maven package org.jenkins-ci.plugins:cons3rt
CVE-2021-26707 Vulnerability in maven package org.webjars.npm:merge-deep
CVE-2021-37694 Vulnerability in npm package @asyncapi/java-spring-cloud-stream-template