Item Creation Bypass Vulnerability in Jenkins by CloudBees
CVE-2024-47804
4.3MEDIUM
Summary
A vulnerability allows attackers with the Item/Configure permission in Jenkins to bypass item creation restrictions via the Jenkins CLI or REST API. In versions 2.478 and earlier, and LTS 2.462.2 and earlier, an item attempted to be created with insufficient permissions is stored in memory instead of being properly restricted. This creates a potential security risk as attackers can save unauthorized items, compromising the integrity and security of Jenkins environments.
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published