Lucene search

K
githubGitHub Advisory DatabaseGHSA-PGPJ-83G3-MFR2
HistoryNov 29, 2023 - 3:30 p.m.

Jenkins Google Compute Engine Plugin has incorrect permission checks

2023-11-2915:30:21
CWE-862
GitHub Advisory Database
github.com
7
jenkins security vulnerability
google compute engine plugin
permission checks
http endpoints
credentials enumeration
attack vulnerability
global permission
information leakage

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.3%

Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier does not correctly perform permission checks in multiple HTTP endpoints. This allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to do the following:

  • Enumerate system-scoped credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.

  • Connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects.

Google Compute Engine Plugin 4.551.v5a_4dc98f6962 requires Overall/Administer permission for the affected HTTP endpoints.

Affected configurations

Vulners
Node
illumiocore_policy_compute_engineRange<4.551.v5a
OR
illumiocore_policy_compute_engineRange<4.3.17.1

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.3%

Related for GHSA-PGPJ-83G3-MFR2