Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47804

Опубликовано: 02 окт. 2024
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

If an attempt is made to create an item of a type prohibited by ACL#hasCreatePermission2 or TopLevelItemDescriptor#isApplicableIn(ItemGroup) through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction.

A flaw was found in Jenkins. When attempting to create an item prohibited by ACL#hasCreatePermission2 or TopLevelItemDescriptor#isApplicableIn(ItemGroup) through the Jenkins CLI or the REST API, if either of these checks fail, Jenkins creates the item in memory and only deletes it from disk. This may allow an attacker with the Item/Configure permission to save the item, effectively bypassing the item creation restriction.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Hubrhdh-operator-containerNot affected
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Not affected
OCP-Tools-4.12-RHEL-8jenkinsFixedRHSA-2024:888605.11.2024
OCP-Tools-4.12-RHEL-8jenkins-2-pluginsFixedRHSA-2024:888605.11.2024
OCP-Tools-4.13-RHEL-8jenkinsFixedRHSA-2024:888705.11.2024
OCP-Tools-4.13-RHEL-8jenkins-2-pluginsFixedRHSA-2024:888705.11.2024
OCP-Tools-4.14-RHEL-8jenkinsFixedRHSA-2024:888505.11.2024
OCP-Tools-4.14-RHEL-8jenkins-2-pluginsFixedRHSA-2024:888505.11.2024
OCP-Tools-4.15-RHEL-8jenkinsFixedRHSA-2024:888405.11.2024
OCP-Tools-4.15-RHEL-8jenkins-2-pluginsFixedRHSA-2024:888405.11.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1220
https://bugzilla.redhat.com/show_bug.cgi?id=2316131jenkins: Item creation restriction bypass vulnerability

EPSS

Процентиль: 49%
0.00261
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
больше 1 года назад

If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction.

CVSS3: 4.3
debian
больше 1 года назад

If an attempt is made to create an item of a type prohibited by `ACL#h ...

CVSS3: 4.3
github
больше 1 года назад

Jenkins item creation restriction bypass vulnerability

CVSS3: 4.3
fstec
больше 1 года назад

Уязвимость сервера автоматизации Jenkins, связанная с недостатками контроля доступа, позволяющая нарушителю обойти ограничения и создать временный элемент

CVSS3: 4.3
redos
около 1 года назад

Множественные уязвимости jenkins

EPSS

Процентиль: 49%
0.00261
Низкий

5.3 Medium

CVSS3