Severity
6.5MEDIUM
EPSS
0.8%
top 26.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 15
Latest updateNov 16

Description

An incorrect permission check in Jenkins Support Core Plugin 1206.v14049fa_b_d860 and earlier allows attackers with Support/DownloadBundle permission to download a previously created support bundle containing information limited to users with Overall/Administer permission.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

Mavenorg.jenkins-ci.plugins:support-core< 1206.1208.v9b_7a_1d48db_0f
CVEListV5jenkins_project/jenkins_support_core_pluginunspecified1206.v14049fa_b_d860
NVDjenkins/support_core< 1206.1208.v9b_7a_1d48db_0f

🔴Vulnerability Details

3
OSV
Incorrect permission checks in Jenkins Support Core Plugin2022-11-16
GHSA
Incorrect permission checks in Jenkins Support Core Plugin2022-11-16
CVEList
CVE-2022-45383: An incorrect permission check in Jenkins Support Core Plugin 12062022-11-15

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2022-11-152022-11-15
CVE-2022-45383 (MEDIUM CVSS 6.5) | An incorrect permission check in Je | cvebase.io