First published: Wed Aug 07 2024(Updated: )
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views".
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.470<2.471 | 2.471 |
maven/org.jenkins-ci.main:jenkins-core | >=2.460<2.462.1 | 2.462.1 |
maven/org.jenkins-ci.main:jenkins-core | <2.452.4 | 2.452.4 |
Jenkins Jenkins | <2.452.4 | |
Jenkins Jenkins | <2.471 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43045 has a high severity level due to unauthorized access to user data.
To fix CVE-2024-43045, upgrade to Jenkins version 2.471 or later, or LTS version 2.462.1 or later.
Jenkins versions 2.470 and earlier, and LTS versions 2.452.3 and earlier are affected by CVE-2024-43045.
Users with Overall/Read permission can exploit CVE-2024-43045 to access other users' My Views.
Yes, CVE-2024-43045 is specifically related to the lack of permission checks in an HTTP endpoint for user views.