Jenkins Pipeline: Groovy Plugin - Unchecked Script Approval Vulnerability
CVE-2024-52550 Published on November 13, 2024
Jenkins Pipeline: Groovy Plugin 3990.vd281dd77a_388 and earlier, except 3975.3977.v478dd9e956c3 does not check whether the main (Jenkinsfile) script for a rebuilt build is approved, allowing attackers with Item/Build permission to rebuild a previous build whose (Jenkinsfile) script is no longer approved.
Vulnerability Analysis
CVE-2024-52550 is exploitable with network access, requires user interaction and a small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Improper Validation of Integrity Check Value
The software does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission. Improper validation of checksums before use results in an unnecessary risk that can easily be mitigated. The protocol specification describes the algorithm used for calculating the checksum. It is then a simple matter of implementing the calculation and verifying that the calculated checksum and the received checksum match. Improper verification of the calculated checksum and the received checksum can lead to far greater consequences.
Products Associated with CVE-2024-52550
Want to know whenever a new CVE is published for Jenkins Pipeline? stack.watch will email you.
Affected Versions
Jenkins Project Jenkins Pipeline: Groovy Plugin:- Before and including 3975.v567e2a_1ffa_22 is affected.
- Version 3990.vd281dd77a_388 is affected.
- Before and including 3975.v567e2a_1ffa_22 is affected.
- Version 3990.vd281dd77a_388 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.