SB2019022015 - Server-Side Request Forgery (SSRF) in Mattermost Notification plugin for Jenkins



SB2019022015 - Server-Side Request Forgery (SSRF) in Mattermost Notification plugin for Jenkins

Published: February 20, 2019 Updated: October 24, 2019

Security Bulletin ID SB2019022015
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2019-1003026)

The disclosed vulnerability allows a remote user to perform SSRF attacks.

The vulnerability exists due to missing permission check in a form validation method. A remote authenticated user with Overall/Read permission can send a specially crafted HTTP request and connect Jenkins to an attacker-specified Mattermost server and room and send a message.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


Remediation

Install update from vendor's website.