CVE-2023-49652
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2023-49652. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credentials IDs of credentials stored in Jenkins and to connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects. This fix has been backported to 4.3.17.1.
Available Exploits
Related News
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Jenkins Google Compute Engine Plugin has incorrect permission checks
GHSA-pgpj-83g3-mfr2Advisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: November 29, 2023, Modified: November 29, 2023