First published: Wed Apr 12 2023(Updated: )
A missing permission check in Jenkins Fogbugz Plugin 2.2.17 and earlier allows attackers with Item/Read permission to trigger builds of jobs specified in a 'jobname' request parameter.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.2.17 | ||
Jenkins Fogbugz | <=2.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30522 is classified as a medium severity vulnerability.
To fix CVE-2023-30522, upgrade the Jenkins Fogbugz Plugin to version 2.2.18 or later.
Versions 2.2.17 and earlier of Jenkins Fogbugz Plugin are affected by CVE-2023-30522.
Attackers need Item/Read permission to exploit CVE-2023-30522.
The vulnerability allows unauthorized triggering of builds for specified jobs, which could lead to unauthorized actions within Jenkins.