Incomplete Access Control in Jenkins Google Compute Engine Plugin
CVE-2019-16547
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 21 November 2019
Summary
The Google Compute Engine Plugin for Jenkins has a vulnerability caused by missing permission checks in its API endpoints. This flaw allows users with Overall/Read permissions to access limited information regarding the plugin's configuration and the environment it operates within. As a result, unauthorized individuals could potentially exploit this weakness to gain insights that should be restricted, compromising the integrity of the Jenkins instance.
Affected Version(s)
Jenkins Google Compute Engine Plugin 4.1.1 and earlier
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved