Permission Bypass in Jenkins Config File Provider Plugin by CloudBees
CVE-2021-21645

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
21 April 2021

Summary

The Jenkins Config File Provider Plugin fails to properly enforce permission checks on several HTTP endpoints. Consequently, attackers with Overall/Read permissions can exploit this vulnerability to enumerate the IDs of configuration files, potentially leading to exposure of sensitive information without further authorization.

Affected Version(s)

Jenkins Config File Provider Plugin <= 3.7.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.