Item Creation Bypass Vulnerability in Jenkins by CloudBees
CVE-2024-47804

4.3MEDIUM

Key Information:

Vendor
Jenkins
Status
Vendor
CVE Published:
2 October 2024

Summary

A vulnerability allows attackers with the Item/Configure permission in Jenkins to bypass item creation restrictions via the Jenkins CLI or REST API. In versions 2.478 and earlier, and LTS 2.462.2 and earlier, an item attempted to be created with insufficient permissions is stored in memory instead of being properly restricted. This creates a potential security risk as attackers can save unauthorized items, compromising the integrity and security of Jenkins environments.

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.