First published: Wed Apr 12 2023(Updated: )
A missing permission check in Jenkins Report Portal Plugin 0.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Report Portal | <=0.5 | |
<=0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30526 is classified as a medium severity vulnerability due to the potential unauthorized access it allows.
To mitigate CVE-2023-30526, upgrade to Report Portal Plugin version 0.6 or later where the permission check is properly implemented.
CVE-2023-30526 affects Jenkins Report Portal Plugin versions 0.5 and earlier.
CVE-2023-30526 allows attackers with Overall/Read permission to connect to arbitrary URLs using bearer token authentication.
Any Jenkins user with Overall/Read permission could be impacted by CVE-2023-30526 if they exploit the missing permission check.