A missing permission check in an HTTP endpoint in Jenkins docker-build-step Plugin 2.11 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified TCP or Unix socket URL, and to reconfigure the plugin using the provided connection test parameters, affecting future build step executions.
History

Mon, 26 Aug 2024 20:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published: 2024-03-06T17:01:52.616Z

Updated: 2024-08-26T18:26:57.196Z

Reserved: 2024-03-06T10:40:48.679Z

Link: CVE-2024-2216

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.393Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-06T17:15:11.640

Modified: 2024-08-26T19:35:26.913

Link: CVE-2024-2216

cve-icon Redhat

No data.