4 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled. • https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3053 • CWE-281: Improper Preservation of Permissions •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders. Una comprobación incorrecta de permiso en Jenkins Role-based Authorization Strategy Plugin versiones 3.1 y anteriores, permite a atacantes con permiso Item/Read en elementos anidados acceder a ellos, incluso si carecen del permiso Item/Read para carpetas principales • http://www.openwall.com/lists/oss-security/2021/03/18/5 https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2182 • CWE-863: Incorrect Authorization •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration. Jenkins Role-based Authorization Strategy Plugin versiones 3.0 y anteriores, no invalida apropiadamente una caché de permisos cuando se cambia la configuración, resultando en que los permisos sean otorgados en función de una configuración desactualizada • http://www.openwall.com/lists/oss-security/2020/10/08/5 https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1767 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins. El plugin Role-based Authorization Strategy no necesita que se envíen peticiones a su API mediante POST, exponiéndose, en consecuencia, a ataques de tipo Cross-Site Request Forgery (CSRF). Esto permite a los atacantes añadir el rol de administrador a cualquier usuario o eliminar la configuración de autorización, evitando el acceso legítimo a Jenkins. • https://jenkins.io/security/advisory/2017-07-10 • CWE-352: Cross-Site Request Forgery (CSRF) •