Incorrect Permission Check in Jenkins Support Core Plugin
CVE-2022-45383
6.5MEDIUM
Summary
An incorrect permission check in the Jenkins Support Core Plugin allows unauthorized users with Support/DownloadBundle permission to download sensitive support bundles. These bundles can contain confidential information that should only be accessible to users with Overall/Administer permission, posing a significant security risk to Jenkins environments.
Affected Version(s)
Jenkins Support Core Plugin <= 1206.v14049fa_b_d860
Jenkins Support Core Plugin 1201.1203.v828b_ef272669
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved