Authorization Bypass Affecting hudson.plugins:project-inheritance package, versions [0,]


0.0
medium

Snyk CVSS

    Attack Complexity Low

    Threat Intelligence

    EPSS 0.05% (21st percentile)
Expand this section
NVD
4.3 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-HUDSONPLUGINS-571316
  • published 4 Jun 2020
  • disclosed 4 Jun 2020
  • credit Daniel Beck, CloudBees, Inc. and, independently, Markus Winter, SAP SE

How to fix?

There is no fixed version for hudson.plugins:project-inheritance.

Overview

hudson.plugins:project-inheritance is a Project Inheritance Plugin

Affected versions of this package are vulnerable to Authorization Bypass. Jenkins limits access to job configuration XML data (config.xml) to users with Job/ExtendedRead permission, typically implied by Job/Configure permission. Project Inheritance Plugin has several job inspection features, including the API URL /job/…​/getConfigAsXML for its Inheritance Project job type that does something similar.

Affected versions do not check permissions for this new endpoint, granting access to job configuration XML data to every user with Job/Read permission.

Additionally, the encrypted values of secrets stored in the job configuration are not redacted, as they would be by the config.xml API for users without Job/Configure permission.

NOTE: This vulnerability has also been identified as: CVE-2020-2198