Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14eGhmLXhxNnYtYzhtas4AAs8W
Improper authorization in Jenkins Embeddable Build Status Plugin bypasses ViewStatus permission requirement
Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access.
This allows attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.
Embeddable Build Status Plugin 2.0.4 requires ViewStatus permission to obtain the build status badge icon.
Permalink: https://github.com/advisories/GHSA-xxhf-xq6v-c8mjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14eGhmLXhxNnYtYzhtas4AAs8W
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 10 months ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-xxhf-xq6v-c8mj, CVE-2022-34180
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-34180
- https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2794
- https://github.com/jenkinsci/embeddable-build-status-plugin/commit/402148784b3f4b029eaf47cc26ebf6b9bc636183
- https://github.com/advisories/GHSA-xxhf-xq6v-c8mj
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:embeddable-build-status
Affected Version Ranges: < 2.0.4Fixed in: 2.0.4