Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/03/06/3 | Mailing List Third Party Advisory |
| https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3144 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2024/03/06/3 | Mailing List Third Party Advisory |
| https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3144 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-03-06 17:15
Updated : 2025-03-29 00:15
NVD link : CVE-2024-28155
Mitre link : CVE-2024-28155
CVE.ORG link : CVE-2024-28155
JSON object : View
Products Affected
jenkins
- appspider
CWE
CWE-862
Missing Authorization
