CVE-2024-43045: Jenkins does not perform a permission check in an HTTP endpoint
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to access other users’ “My Views”. Attackers with global View/Configure and View/Delete permissions are also able to change other users’ “My Views”.
Jenkins 2.471, LTS 2.452.4, LTS 2.462.1 restricts access to a user’s “My Views” to the owning user and administrators.
References
- github.com/advisories/GHSA-8pv9-qh96-9hc6
- github.com/jenkinsci/jenkins
- github.com/jenkinsci/jenkins/commit/0c13259cebc6a780fee7825838f4dd98ece8e68a
- github.com/jenkinsci/jenkins/commit/3752f406bfef764e4954238acf44343169ae5799
- github.com/jenkinsci/jenkins/commit/efece77d759b38c95b39b191051a8203bbc2f428
- nvd.nist.gov/vuln/detail/CVE-2024-43045
- www.jenkins.io/security/advisory/2024-08-07/
Detect and mitigate CVE-2024-43045 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →