CVE-2024-2216

high

Description

A missing permission check in an HTTP endpoint in Jenkins docker-build-step Plugin 2.11 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified TCP or Unix socket URL, and to reconfigure the plugin using the provided connection test parameters, affecting future build step executions.

References

https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3200

http://www.openwall.com/lists/oss-security/2024/03/06/3

Details

Source: Mitre, NVD

Published: 2024-03-06

Updated: 2024-08-26

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High