Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credentials IDs of credentials stored in Jenkins and to connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects. This fix has been backported to 4.3.17.1.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-3006 Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credentials IDs of credentials stored in Jenkins and to connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects. This fix has been backported to 4.3.17.1.
Github GHSA Github GHSA GHSA-pgpj-83g3-mfr2 Jenkins Google Compute Engine Plugin has incorrect permission checks
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-02T22:01:25.605Z

Reserved: 2023-11-28T21:18:14.327Z

Link: CVE-2023-49652

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-29T14:15:07.460

Modified: 2024-11-21T08:33:39.790

Link: CVE-2023-49652

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses