Jenkins Rundeck Plugin Access Control Vulnerability
CVE-2022-41233

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
21 September 2022

Summary

The Jenkins Rundeck Plugin prior to version 3.6.12 lacks proper Run/Artifacts permission checks in various HTTP endpoints. This insufficient validation allows users with only Item/Read permissions to access sensitive information about build artifacts of a job, given that the optional Run/Artifacts permissions are enabled. This oversight poses a notable risk as it could potentially expose sensitive data to unauthorized users.

Affected Version(s)

Jenkins Rundeck Plugin <= 3.6.11

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.