Insufficient Permission Check in CloudBees CD Plugin Affects Jenkins
CVE-2021-21647
4.3MEDIUM
Summary
The CloudBees CD Plugin for Jenkins allows attackers with only Item/Read permission to schedule builds of projects, circumventing the necessary Item/Build permission checks. This significant oversight presents a risk, as it enables unauthorized individuals to initiate project builds, potentially leading to unintended consequences in the workflow and compromising the integrity of the CI/CD pipeline.
Affected Version(s)
Jenkins CloudBees CD Plugin <= 1.1.21
Jenkins CloudBees CD Plugin 1.1.18.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved