Missing Permission Check in Jenkins Continuous Integration with Toad Edge Plugin
CVE-2022-28147
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 29 March 2022
Summary
A security flaw exists in the Toad Edge Plugin for Jenkins Continuous Integration, where a missing permission check allows users with Overall/Read permissions to verify the existence of any specified file path on the Jenkins controller's file system. This could potentially lead to information disclosure and unauthorized access to sensitive file locations, making it crucial for administrators to implement necessary updates to bolster system security.
Affected Version(s)
Jenkins Continuous Integration with Toad Edge Plugin <= 2.3
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved