Unauthorized Access in Jenkins S3 Publisher Plugin by Jenkins
CVE-2021-21650

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
11 May 2021

Summary

The S3 Publisher Plugin for Jenkins fails to enforce proper permission checks on several HTTP endpoints and API methods. This oversight allows users with Item/Read permissions to access and retrieve sensitive information regarding artifacts uploaded to Amazon S3, provided the optional Run/Artifacts permission is enabled. As a result, unauthorized individuals may exploit this vulnerability to gain insight into the artifacts, potentially leading to exposure of confidential or sensitive data.

Affected Version(s)

Jenkins S3 publisher Plugin <= 0.11.6

Jenkins S3 publisher Plugin 0.11.5.1

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.