Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-phf8-3qgv-rg5q] Update CVSS 3.x Privilege Required (PR) from None (N) to Low (L) #5191

Conversation

anonymous-nlp-student
Copy link

Summary

The Privilege Required (PR) metric for CVE-2017-1000105 / GHSA-phf8-3qgv-rg5q should be revised from None to Low. This vulnerability enables users with lower privileges, such as Item/Read permissions, to elevate their access to higher privileges, like Run/Artifacts permissions, by modifying a Java system property. This scenario does not align with cases requiring no permissions or administrative privileges, justifying the proposed update.

GHSA Description

The optional Run/Artifacts permission can be enabled by setting a Java system property. Blue Ocean did not check this permission before providing access to archived artifacts, Item/Read permission was sufficient.

CVSS 3.x Specifications

The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack. (CVSS 3.x Specification for PR = N)

The attacker requires privileges that provide significant (e.g., administrative) control over the vulnerable component allowing access to component-wide settings and files. (CVSS 3.x Specification for PR = H)

Supporting Examples

[...] This allows attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.

Jenkins Rundeck Plugin 3.6.11 and earlier does not perform Run/Artifacts permission checks in multiple HTTP endpoints, allowing attackers with Item/Read permission to obtain information about build artifacts of a given job, if the optional Run/Artifacts permission is enabled.

@github-actions github-actions bot changed the base branch from main to anonymous-nlp-student/advisory-improvement-5191 January 17, 2025 16:09
@anonymous-nlp-student anonymous-nlp-student closed this by deleting the head repository Jan 17, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant