Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oeHB3LTd4OTUtcTM4bc4AAYTu
Jenkins Pipeline: Input Step Plugin
The Pipeline: Input Step Plugin by default allowed users with Item/Read access to a pipeline to interact with the step to provide input. This has been changed, and now requires users to have the Item/Build permission instead.
Permalink: https://github.com/advisories/GHSA-hxpw-7x95-q38mJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oeHB3LTd4OTUtcTM4bc4AAYTu
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 10 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-hxpw-7x95-q38m, CVE-2017-1000108
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-1000108
- https://jenkins.io/security/advisory/2017-08-07/
- https://github.com/advisories/GHSA-hxpw-7x95-q38m
Affected Packages
maven:org.jenkins-ci.plugins:pipeline-input-step
Versions: < 2.7Fixed in: 2.7