logo

CVE-2021-21626 io.jenkins.plugins:warnings-ng

Package

Manager: maven
Name: io.jenkins.plugins:warnings-ng
Vulnerable Version: >=0 <8.5.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00031 pctl0.07238

Details

Missing permission checks in Jenkins Warnings Next Generation Plugin allow listing workspace contents Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents. A sequence of requests can be used to effectively list workspace contents. Jenkins Warnings Next Generation Plugin 8.5.0 requires Item/Configure permission to validate patterns with workspace contents.

Metadata

Created: 2022-05-24T17:44:48Z
Modified: 2023-10-27T13:54:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7j3x-xm4j-jfj7/GHSA-7j3x-xm4j-jfj7.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-7j3x-xm4j-jfj7
Finding: F039
Auto approve: 1