Jenkins Gearman Plugin Affected by Missing Permission Check
CVE-2019-1003083
6.5MEDIUM
Summary
The Jenkins Gearman Plugin suffers from a vulnerability where a missing permission check in the GearmanPluginConfig#doTestConnection method can be exploited by attackers with Overall/Read permissions. This flaw may allow them to initiate connections to arbitrary servers of their choosing, potentially leading to unauthorized access or data exposure. It highlights the importance of implementing strict permission checks within plugin functionalities to safeguard against malicious activities.
Affected Version(s)
Jenkins Gearman Plugin all versions as of 2019-04-03
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved