Lucene search

K
cveJenkinsCVE-2023-50765
HistoryDec 13, 2023 - 6:15 p.m.

CVE-2023-50765

2023-12-1318:15:43
CWE-862
jenkins
web.nvd.nist.gov
29
jenkins
scriptler plugin
permission check
access control
cve-2023-50765

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.2

Confidence

High

EPSS

0

Percentile

13.3%

A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID.

Affected configurations

Nvd
Node
jenkinsscriptlerRange342.v6a_89fd40f466jenkins
VendorProductVersionCPE
jenkinsscriptler*cpe:2.3:a:jenkins:scriptler:*:*:*:*:*:jenkins:*:*

CNA Affected

[
  {
    "vendor": "Jenkins Project",
    "product": "Jenkins Scriptler Plugin",
    "versions": [
      {
        "version": "0",
        "versionType": "maven",
        "lessThanOrEqual": "342.v6a_89fd40f466",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.2

Confidence

High

EPSS

0

Percentile

13.3%