Description
Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/12/13/4
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3179
Related Vulnerabilities
CVE-2020-2202 Vulnerability in maven package org.jenkins-ci.plugins:fortify-on-demand-uploader
CVE-2023-48796 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-master
CVE-2021-41766 Vulnerability in maven package org.apache.karaf:apache-karaf
CVE-2022-46687 Vulnerability in maven package io.jenkins.plugins:spring-config
CVE-2023-44794 Vulnerability in maven package cn.dev33:sa-token-core