CVE-2017-1000399 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.73.2 || >=2.74 <2.84
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00149 pctl0.36047
Details
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /queue/item/(ID)/api showed information about tasks in the queue (typically builds waiting to start). This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API endpoint is now only available for tasks that the current user has access to.
Metadata
Created: 2022-05-14T01:04:36Z
Modified: 2022-07-01T21:53:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g78x-xmv8-23xp/GHSA-g78x-xmv8-23xp.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-g78x-xmv8-23xp
Finding: F038
Auto approve: 1