Insufficient Permission Check in Jenkins Leads to Unauthorized Process Execution
CVE-2017-2611

4.3MEDIUM

Key Information:

Status
Vendor
CVE Published:
8 May 2018

What is CVE-2017-2611?

Jenkins versions prior to 2.44 and 2.32.2 exhibit a security flaw due to inadequate permission checks on periodic processes. Specifically, endpoints such as /workspaceCleanup and /fingerprintCleanup allow users with mere read access to trigger these maintenance processes. This could inadvertently lead to increased load on both the Jenkins master and agent nodes, impacting overall system performance.

Affected Version(s)

jenkins jenkins 2.44

jenkins jenkins 2.32.2

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.