Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1048 | Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names. |
Github GHSA |
GHSA-xxv9-w5hm-328j | Jenkins AppSpider Plugin missing permission checks |
Fri, 14 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 19 Jan 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins appspider |
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:jenkins:appspider:*:*:*:*:*:jenkins:*:* | |
| Vendors & Products |
Jenkins
Jenkins appspider |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-28T23:32:39.581Z
Reserved: 2024-03-05T19:29:05.205Z
Link: CVE-2024-28155
Updated: 2024-08-02T00:48:49.350Z
Status : Modified
Published: 2024-03-06T17:15:10.787
Modified: 2025-03-29T00:15:20.293
Link: CVE-2024-28155
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA