GHSA-h8w6-c53g-53vv

Suggest an improvement
Source
https://github.com/advisories/GHSA-h8w6-c53g-53vv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h8w6-c53g-53vv/GHSA-h8w6-c53g-53vv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-h8w6-c53g-53vv
Aliases
Published
2022-05-24T17:06:23Z
Modified
2023-11-08T04:02:49.389364Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Missing permission checks in Jenkins Sounds Plugin allow OS command execution
Details

Jenkins Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation, allowing attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins.

Database specific
{
    "nvd_published_at": "2020-01-15T16:15:00Z",
    "github_reviewed_at": "2022-12-21T16:47:24Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-285"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins:sounds

Package

Name
org.jenkins-ci.plugins:sounds
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/sounds

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6

Affected versions

0.*

0.5