Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oajMyLTltY3ctNWN3aM4AAk1I
Missing permission check in Jenkins Project Inheritance Plugin
Jenkins limits access to job configuration XML data (config.xml
) to users with Job/ExtendedRead permission, typically implied by Job/Configure permission. Project Inheritance Plugin has several job inspection features, including the API URL /job/…/getConfigAsXML
for its Inheritance Project job type that does something similar.
Project Inheritance Plugin 21.04.03 and earlier does not check permissions for this new endpoint, granting access to job configuration XML data to every user with Job/Read permission.
Additionally, the encrypted values of secrets stored in the job configuration are not redacted, as they would be by the config.xml
API for users without Job/Configure permission.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oajMyLTltY3ctNWN3aM4AAk1I
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 1 year ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-hj32-9mcw-5cwh, CVE-2020-2197
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2197
- https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1582
- http://www.openwall.com/lists/oss-security/2020/06/03/3
- https://github.com/github/advisory-database/pull/1356
- https://github.com/advisories/GHSA-hj32-9mcw-5cwh
Blast Radius: 1.0
Affected Packages
maven:hudson.plugins:project-inheritance
Affected Version Ranges: <= 21.04.03No known fixed version