{"id":"CVE-2019-10455","details":"A missing permission check in Jenkins Rundeck Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.","aliases":["GHSA-p4f7-7c33-9675"],"modified":"2026-04-10T04:13:52.299564Z","published":"2019-10-16T14:15:13.370Z","references":[{"type":"ADVISORY","url":"https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1460"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/rundeck-plugin","events":[{"introduced":"0"},{"last_affected":"c052705af2a2086719fba04937df8ab0af2be20e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.6.5"}]}}],"versions":["rundeck-1.0","rundeck-1.1","rundeck-1.2","rundeck-1.3","rundeck-1.4","rundeck-1.5","rundeck-1.6","rundeck-1.7","rundeck-1.8","rundeck-2.0","rundeck-2.0.1","rundeck-2.1","rundeck-2.10","rundeck-2.11","rundeck-2.2","rundeck-2.3","rundeck-2.3.1","rundeck-2.4","rundeck-2.5","rundeck-2.6","rundeck-2.7","rundeck-2.8","rundeck-2.9","rundeck-3.0","rundeck-3.1","rundeck-3.2","rundeck-3.3","rundeck-3.4","rundeck-3.5","rundeck-3.5.1","rundeck-3.5.2","rundeck-3.5.3","rundeck-3.5.4","rundeck-3.6.0","rundeck-3.6.1","rundeck-3.6.2","rundeck-3.6.3","rundeck-3.6.4","rundeck-3.6.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10455.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}