Unauthorized Access in Jenkins S3 Publisher Plugin by Jenkins
CVE-2021-21650
4.3MEDIUM
Summary
The S3 Publisher Plugin for Jenkins fails to enforce proper permission checks on several HTTP endpoints and API methods. This oversight allows users with Item/Read permissions to access and retrieve sensitive information regarding artifacts uploaded to Amazon S3, provided the optional Run/Artifacts permission is enabled. As a result, unauthorized individuals may exploit this vulnerability to gain insight into the artifacts, potentially leading to exposure of confidential or sensitive data.
Affected Version(s)
Jenkins S3 publisher Plugin <= 0.11.6
Jenkins S3 publisher Plugin 0.11.5.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved