Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 19 Jan 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins
Jenkins appspider |
|
Weaknesses | CWE-862 | |
CPEs | cpe:2.3:a:jenkins:appspider:*:*:*:*:*:jenkins:*:* | |
Vendors & Products |
Jenkins
Jenkins appspider |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:47:21.421Z
Reserved: 2024-03-05T19:29:05.205Z
Link: CVE-2024-28155

Updated: 2024-08-02T00:48:49.350Z

Status : Analyzed
Published: 2024-03-06T17:15:10.787
Modified: 2025-01-19T02:29:23.020
Link: CVE-2024-28155

No data.