First published: Wed Sep 16 2020(Updated: )
Health Advisor by CloudBees Plugin 3.2.0 and earlier does not correctly perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to view an administrative configuration page. Health Advisor by CloudBees Plugin 3.2.1 requires Overall/Administer to view its administrative configuration page.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Health Advisor By Cloudbees | <=3.2.0 | |
maven/org.jenkins-ci.plugins:cloudbees-jenkins-advisor | <=3.2.0 | 3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2258 is classified as a medium severity vulnerability.
To fix CVE-2020-2258, upgrade Health Advisor by CloudBees Plugin to version 3.2.1 or later.
Exploiting CVE-2020-2258 allows unauthorized users with Overall/Read permission to access sensitive administrative configuration information.
CVE-2020-2258 affects versions of the Health Advisor by CloudBees Plugin up to and including 3.2.0.
No, CVE-2020-2258 does not allow for remote code execution, but it does lead to unauthorized access to administrative configurations.