Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:40912
HistoryJun 15, 2023 - 6:15 p.m.

Improper Access Control

2023-06-1518:15:30
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
25
jenkins
vulnerability
access control
unauthorized actions
software

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.2%

Jenkins Core is vulnerable to Improper Access Control. The vulnerability exists due to loading the context actions via POST request, which allows an attacker to craft a URL and perform unauthorized actions on behalf of an unexpected user.

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.2%