Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000108

Опубликовано: 07 авг. 2017
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

The Pipeline: Input Step Plugin by default allowed users with Item/Read access to a pipeline to interact with the step to provide input. This has been changed, and now requires users to have the Item/Build permission instead.

Отчет

This issue affects the versions of jenkins-plugin-script-security as shipped with Red Hat OpenShift Enterprise. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 3jenkins-plugin-pipeline-input-stepWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1482094jenkins-plugin-pipeline-input-step: Input Step Plugin allows users with read access to interact with the step by default

EPSS

Процентиль: 25%
0.00085
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 8 лет назад

The Pipeline: Input Step Plugin by default allowed users with Item/Read access to a pipeline to interact with the step to provide input. This has been changed, and now requires users to have the Item/Build permission instead.

CVSS3: 7.5
github
больше 3 лет назад

Jenkins Pipeline: Input Step Plugin

EPSS

Процентиль: 25%
0.00085
Низкий

4.3 Medium

CVSS3