Access Restriction Bypass Affecting org.jenkins-ci.plugins:quayio-trigger package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-5422073
  • published13 Apr 2023
  • disclosed12 Apr 2023
  • creditUnknown

Introduced: 12 Apr 2023

CVE-2023-30519  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

There is no fixed version for org.jenkins-ci.plugins:quayio-trigger.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. Jenkins Quay.io trigger Plugin provides a webhook endpoint at /quayio-webhook/ that can be used to trigger builds of jobs configured to use a specified repository.

In Quay.io trigger Plugin 0.1 and earlier, this endpoint can be accessed without authentication.

This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.

CVSS Scores

version 3.1