Loading HuntDB...

GHSA-j33r-cgm6-pv48

GitHub Security Advisory

Missing Authorization in Jenkins Recipe Plugin

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Missing permission checks in Jenkins Recipe Plugin 1.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML.

Additionally, the plugin allows users to export the full configuration of jobs as part of a recipe, granting access to job configuration XML data to every user with Item/Read permission. The encrypted values of secrets stored in the job configuration are not redacted, as they would be by the config.xml API for users without Item/Configure permission.

Affected Packages

Maven org.jenkins-ci.plugins:recipe
Affected versions: 0 (last affected: 1.2)

Related CVEs

Key Information

GHSA ID
GHSA-j33r-cgm6-pv48
Published
July 1, 2022 12:01 AM
Last Modified
December 12, 2022 7:53 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:recipe
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.