Jenkins Rundeck Plugin Access Control Vulnerability
CVE-2022-41233
4.3MEDIUM
Summary
The Jenkins Rundeck Plugin prior to version 3.6.12 lacks proper Run/Artifacts permission checks in various HTTP endpoints. This insufficient validation allows users with only Item/Read permissions to access sensitive information about build artifacts of a job, given that the optional Run/Artifacts permissions are enabled. This oversight poses a notable risk as it could potentially expose sensitive data to unauthorized users.
Affected Version(s)
Jenkins Rundeck Plugin <= 3.6.11
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved