Description
A missing permission check in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3119
http://www.openwall.com/lists/oss-security/2023/07/12/2
Related Vulnerabilities
CVE-2012-4431 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2021-3827 Vulnerability in maven package org.keycloak:keycloak-saml-core
CVE-2022-0155 Vulnerability in npm package follow-redirects
CVE-2022-29040 Vulnerability in maven package org.jenkins-ci.plugins:git-parameter
CVE-2022-42920 Vulnerability in maven package org.apache.bcel:bcel