Description
Jenkins before versions 2.44, 2.32.2 is vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenkins to trigger these background processes (that are otherwise performed daily), possibly causing additional load on Jenkins master and agents.
Remediation
References
https://jenkins.io/security/advisory/2017-02-01/
https://github.com/jenkinsci/jenkins/commit/97a61a9fe55f4c16168c123f98301a5173b9fa86
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2611
http://www.securityfocus.com/bid/95956
Related Vulnerabilities
CVE-2020-6449 Vulnerability in maven package org.webjars.npm:electron
CVE-2022-46907 Vulnerability in maven package org.apache.jspwiki:jspwiki-war
CVE-2011-1184 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2017-17837 Vulnerability in maven package org.apache.deltaspike.modules:jsf-module-project
CVE-2023-46131 Vulnerability in maven package org.grails:grails-encoder