First published: Wed Mar 06 2024(Updated: )
Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.rapid7:jenkinsci-appspider-plugin | <1.0.17 | 1.0.17 |
Jenkins AppSpider | <1.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28155 has a medium severity rating, which indicates that it poses a moderate security risk.
To fix CVE-2024-28155, upgrade the Jenkins AppSpider Plugin to version 1.0.17 or later.
Due to CVE-2024-28155, attackers can gain access to scan config names, engine group names, and client names.
CVE-2024-28155 affects Jenkins AppSpider Plugin versions 1.0.16 and earlier.
Users with Overall/Read permission in Jenkins are impacted by CVE-2024-28155, as they can exploit the lack of permission checks.