Lucene search

K
cve[email protected]CVE-2023-41945
HistorySep 06, 2023 - 1:15 p.m.

CVE-2023-41945

2023-09-0613:15:11
CWE-862
web.nvd.nist.gov
78
cve-2023
jenkins
assembla auth plugin
authorization
security issue

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.0%

Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted.

Affected configurations

NVD
Node
jenkinsassembla_authRange1.14jenkins

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Jenkins Assembla Auth Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "1.14",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.0%

Related for CVE-2023-41945