The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Authorization Bypass vulnerabilities in an interactive lesson.
Start learningThere is no fixed version for hudson.plugins:project-inheritance
.
hudson.plugins:project-inheritance is a Project Inheritance Plugin
Affected versions of this package are vulnerable to Authorization Bypass. Jenkins limits access to job configuration XML data (config.xml
) to users with Job/ExtendedRead
permission, typically implied by Job/Configure permission. Project Inheritance Plugin has several job inspection features, including the API URL /job/…/getConfigAsXML
for its Inheritance Project job type that does something similar.
Affected versions do not check permissions for this new endpoint, granting access to job configuration XML data to every user with Job/Read permission.
Additionally, the encrypted values of secrets stored in the job configuration are not redacted, as they would be by the config.xml
API for users without Job/Configure permission.
NOTE: This vulnerability has also been identified as: CVE-2020-2198