Lucene search

K
githubGitHub Advisory DatabaseGHSA-8HH2-RXM8-7FJ8
HistoryMar 30, 2022 - 12:00 a.m.

Missing permission check in Jenkins Continuous Integration with Toad Edge Plugin

2022-03-3000:00:23
CWE-281
CWE-862
GitHub Advisory Database
github.com
11
jenkins
continuous integration
toad edge plugin
missing permission check
attackers
file system

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

22.0%

A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

Affected configurations

Vulners
Node
org.jenkins-ci.pluginsci-with-toad-edgeRange<2.4
VendorProductVersionCPE
org.jenkins-ci.pluginsci-with-toad-edge*cpe:2.3:a:org.jenkins-ci.plugins:ci-with-toad-edge:*:*:*:*:*:*:*:*

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

22.0%

Related for GHSA-8HH2-RXM8-7FJ8