ID CVE-2023-28668
Summary Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled.
References
Vulnerable Configurations
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:1.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:1.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:1.1.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:1.1.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:1.1.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:1.1.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.2.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.2.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.3.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.3.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.3.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.3.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.3.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.3.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.4.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.4.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.5.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.5.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.5.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.5.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.6.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.6.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.6.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.6.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.7.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.7.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.8.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.8.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.8.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.8.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.8.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.8.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.9.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.9.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.10:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.10:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.11:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.11:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.12:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.12:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.13:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.13:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.14:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.14:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.15:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.15:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:2.16:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:2.16:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:3.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:3.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:role-based_authorization_strategy:3.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:role-based_authorization_strategy:3.1:*:*:*:*:jenkins:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-281
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 07-04-2023 - 19:52
Published 02-04-2023 - 21:15
Last modified 07-04-2023 - 19:52
Back to Top