Описание
The Periodic Backup Plugin did not perform any permission checks, allowing any user with Overall/Read access to change its settings, trigger backups, restore backups, download backups, and also delete all previous backups via log rotation. Additionally, the plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks.
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:jenkins:periodic_backup:1.0:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:periodic_backup:1.1:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:periodic_backup:1.2:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:periodic_backup:1.3:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:periodic_backup:1.4:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 25%
0.00088
Низкий
8 High
CVSS3
6 Medium
CVSS2
Дефекты
CWE-862
Связанные уязвимости
CVSS3: 8
github
больше 3 лет назад
Missing permission checks in Jenkins Periodic Backup Plugin allow every user to change settings
EPSS
Процентиль: 25%
0.00088
Низкий
8 High
CVSS3
6 Medium
CVSS2
Дефекты
CWE-862