Description
A missing permission check in Jenkins Relution Enterprise Appstore Publisher Plugin 1.24 and earlier allows attackers to have Jenkins initiate an HTTP connection to an attacker-specified server.
Remediation
References
http://www.openwall.com/lists/oss-security/2019/08/07/1
https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053
Related Vulnerabilities
CVE-2022-43407 Vulnerability in maven package org.jenkins-ci.plugins:pipeline-input-step
CVE-2018-20433 Vulnerability in maven package c3p0:c3p0
CVE-2021-31404 Vulnerability in maven package com.vaadin:flow-server
CVE-2021-42567 Vulnerability in maven package org.apereo.cas:cas-server-core-services
CVE-2022-42004 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind