Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2023-49652
HistoryNov 29, 2023 - 2:15 p.m.

CVE-2023-49652

2023-11-2914:15:07
Alpine Linux Development Team
security.alpinelinux.org
6
permission checks
jenkins
google compute engine plugin

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

3.6 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.3%

Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credentials IDs of credentials stored in Jenkins and to connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects. This fix has been backported to 4.3.17.1.

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

3.6 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.3%

Related for ALPINE:CVE-2023-49652