Description
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1317 | Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled. |
Github GHSA |
GHSA-fvfc-8pqr-wjpv | Missing Authorization in Jenkins S3 publisher Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T18:23:27.382Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21650
No data.
Status : Modified
Published: 2021-05-11T15:15:07.953
Modified: 2024-11-21T05:48:46.110
Link: CVE-2021-21650
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD
Github GHSA