CVE-2020-2183: Improper permission checks in Jenkins Copy Artifact Plugin
5.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.1451%
CWE
Published
5/24/2022
Updated
12/22/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:copyartifact | maven | <= 1.43.1 | 1.44 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) Improper validation()
during job configuration where parameterized project names bypassed security checks, and 2) Insufficient runtime permission checks when actually copying artifacts. The canReadFrom
method's original implementation used weak 'authenticated anonymous' checks and didn't properly integrate with Jenkins' security systems. The perform
method lacked the critical canReadArtifact
check added in the patch that enforces Run.ARTIFACTS
permissions. The commit diff shows significant security enhancements in both methods, including the introduction of production/migration
modes and proper ACL checks.