Missing permission checks in Jenkins Recipe Plugin 1.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML.
Additionally, the plugin allows users to export the full configuration of jobs as part of a recipe, granting access to job configuration XML data to every user with Item/Read permission. The encrypted values of secrets stored in the job configuration are not redacted, as they would be by the config.xml API for users without Item/Configure permission.
{ "nvd_published_at": "2022-06-30T18:15:00Z", "github_reviewed_at": "2022-07-12T20:38:27Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-862" ] }