GHSA-fvfc-8pqr-wjpv

Suggest an improvement
Source
https://github.com/advisories/GHSA-fvfc-8pqr-wjpv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-fvfc-8pqr-wjpv/GHSA-fvfc-8pqr-wjpv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fvfc-8pqr-wjpv
Aliases
  • CVE-2021-21650
Published
2021-06-16T17:29:08Z
Modified
2024-02-16T08:06:10.030963Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Missing Authorization in Jenkins S3 publisher Plugin
Details

Jenkins S3 publisher Plugin prior to 0.11.7 and 0.11.5.1 does not perform Run/Artifacts permission checks in various HTTP endpoints and API models.

This allows attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.

Jenkins S3 publisher Plugin 0.11.7 and 0.11.5.1 requires Run/Artifacts permission to obtain information about artifacts if this permission is enabled.

References

Affected packages

Maven / org.jenkins-ci.plugins:s3

Package

Name
org.jenkins-ci.plugins:s3
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/s3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.11.6
Fixed
0.11.7

Affected versions

0.*

0.11.6

Maven / org.jenkins-ci.plugins:s3

Package

Name
org.jenkins-ci.plugins:s3
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/s3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.5.1

Affected versions

0.*

0.2.0
0.3.0
0.3.1
0.3.2
0.4
0.5
0.6
0.7
0.8
0.9.1
0.9.2
0.9.3
0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.10.5.1
0.10.6
0.10.7
0.10.9
0.10.10
0.10.11
0.10.12
0.11.0
0.11.1
0.11.2
0.11.3
0.11.4
0.11.5