-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| hudson.plugins:project-inheritance | maven | <= 21.04.03 |
The vulnerability description explicitly identifies the /job/.../getConfigAsXML endpoint as the affected component. In Jenkins plugin architecture, such endpoints are typically implemented as do[Verb] methods in Java classes. The combination of missing permission checks (Job/ExtendedRead) and lack of secret redaction strongly suggests the handler method for this endpoint is vulnerable. The naming follows Jenkins convention where API endpoints map to doGetConfigAsXML-style methods in job type implementations. While exact code isn't shown, the architectural patterns and vulnerability description provide high confidence in this identification.
A Semantic Attack on Google Gemini - Read the Latest Research