Authorization Bypass Affecting hudson.plugins:project-inheritance package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-HUDSONPLUGINS-571316
  • published4 Jun 2020
  • disclosed4 Jun 2020
  • creditDaniel Beck, CloudBees, Inc. and, independently, Markus Winter, SAP SE

Introduced: 4 Jun 2020

CVE-2020-2197  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

There is no fixed version for hudson.plugins:project-inheritance.

Overview

hudson.plugins:project-inheritance is a Project Inheritance Plugin

Affected versions of this package are vulnerable to Authorization Bypass. Jenkins limits access to job configuration XML data (config.xml) to users with Job/ExtendedRead permission, typically implied by Job/Configure permission. Project Inheritance Plugin has several job inspection features, including the API URL /job/…​/getConfigAsXML for its Inheritance Project job type that does something similar.

Affected versions do not check permissions for this new endpoint, granting access to job configuration XML data to every user with Job/Read permission.

Additionally, the encrypted values of secrets stored in the job configuration are not redacted, as they would be by the config.xml API for users without Job/Configure permission.

NOTE: This vulnerability has also been identified as: CVE-2020-2198

CVSS Base Scores

version 3.1