Lucene search

K
cve[email protected]CVE-2023-30519
HistoryApr 12, 2023 - 6:15 p.m.

CVE-2023-30519

2023-04-1218:15:09
CWE-862
web.nvd.nist.gov
16
cve-2023-30519
jenkins
quay.io trigger plugin
permission check
unauthenticated attackers
repository

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

45.9%

A missing permission check in Jenkins Quay.io trigger Plugin 0.1 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.

Affected configurations

NVD
Node
jenkinsquay.io_triggerRange0.1jenkins

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Jenkins Quay.io trigger Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "0.1",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

45.9%

Related for CVE-2023-30519