Missing Permission Checks in Jenkins PaaSLane Estimate Plugin
CVE-2023-50779
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 13 December 2023
Summary
The Jenkins PaaSLane Estimate Plugin versions 1.0.4 and earlier are susceptible to a vulnerability that lacks essential permission checks. This weakness potentially allows attackers with Overall/Read permissions to leverage an attacker-defined URL via an attacker-specified token, exposing the system to unauthorized connections and potential data leaks. Immediate action is advised to protect against this risk.
Affected Version(s)
Jenkins PaaSLane Estimate Plugin 0 <= 1.0.4
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved