The Periodic Backup Plugin did not perform any permission checks, allowing any user with Overall/Read access to change its settings, trigger backups, restore backups, download backups, and also delete all previous backups via log rotation. Additionally, the plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks.
References
Link Resource
http://www.securityfocus.com/bid/100437 Third Party Advisory VDB Entry
https://jenkins.io/security/advisory/2017-07-10/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-10-04T01:00:00

Updated: 2017-10-04T09:57:01

Reserved: 2017-07-13T00:00:00


Link: CVE-2017-1000086

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-10-05T01:29:03.570

Modified: 2020-08-24T17:37:01.140


Link: CVE-2017-1000086

JSON object: View

cve-icon Redhat Information

No data.

CWE