Jenkins Role-based Authorization Strategy Plugin grants permissions even after they’ve been disabled
Moderate severity
GitHub Reviewed
Published
Apr 2, 2023
to the GitHub Advisory Database
•
Updated Feb 25, 2025
Package
Affected versions
< 587.588.v850a
Patched versions
587.588.v850a_20a_30162
Description
Published by the National Vulnerability Database
Apr 2, 2023
Published to the GitHub Advisory Database
Apr 2, 2023
Reviewed
Apr 3, 2023
Last updated
Feb 25, 2025
Permissions in Jenkins can be enabled and disabled. Some permissions are disabled by default, e.g., Overall/Manage or Item/Extended Read. Disabled permissions cannot be granted directly, only through greater permissions that imply them (e.g., Overall/Administer or Item/Configure).
Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they’ve been disabled.
This allows attackers to have greater access than they’re entitled to after the following operations took place:
A permission is granted to attackers directly or through groups.
The permission is disabled, e.g., through the script console.
Role-based Authorization Strategy Plugin 587.588.v850a_20a_30162 does not grant disabled permissions.
References