ghsa-hj32-9mcw-5cwh
Vulnerability from github
Published
2022-05-24 17:19
Modified
2023-10-26 22:24
Severity ?
Summary
Missing permission check in Jenkins Project Inheritance Plugin
Details
Jenkins limits access to job configuration XML data (config.xml
) to users with Job/ExtendedRead permission, typically implied by Job/Configure permission. Project Inheritance Plugin has several job inspection features, including the API URL /job/…/getConfigAsXML
for its Inheritance Project job type that does something similar.
Project Inheritance Plugin 21.04.03 and earlier does not check permissions for this new endpoint, granting access to job configuration XML data to every user with Job/Read permission.
Additionally, the encrypted values of secrets stored in the job configuration are not redacted, as they would be by the config.xml
API for users without Job/Configure permission.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "hudson.plugins:project-inheritance" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "21.04.03" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-2197" ], "database_specific": { "cwe_ids": [ "CWE-285" ], "github_reviewed": true, "github_reviewed_at": "2022-12-21T17:47:08Z", "nvd_published_at": "2020-06-03T13:15:00Z", "severity": "MODERATE" }, "details": "Jenkins limits access to job configuration XML data (`config.xml`) to users with Job/ExtendedRead permission, typically implied by Job/Configure permission. Project Inheritance Plugin has several job inspection features, including the API URL `/job/\u2026\u200b/getConfigAsXML` for its Inheritance Project job type that does something similar.\n\nProject Inheritance Plugin 21.04.03 and earlier does not check permissions for this new endpoint, granting access to job configuration XML data to every user with Job/Read permission.\n\nAdditionally, the encrypted values of secrets stored in the job configuration are not redacted, as they would be by the `config.xml` API for users without Job/Configure permission.", "id": "GHSA-hj32-9mcw-5cwh", "modified": "2023-10-26T22:24:33Z", "published": "2022-05-24T17:19:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2197" }, { "type": "WEB", "url": "https://github.com/github/advisory-database/pull/1356" }, { "type": "WEB", "url": "https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1582" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2020/06/03/3" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Missing permission check in Jenkins Project Inheritance Plugin" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.