-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the URL path matching logic in isSubjectToMandatoryReadPermissionCheck. The pre-fix implementation checked if requested paths started with entries from ALWAYS_READABLE_PATHS (e.g., '/login'), allowing any path with matching prefixes (like '/loginFoo') to bypass permission checks. The commit changed the comparison to exact path matches (using startsWith('/name/') or equals('/name')) and modified how paths are stored in ALWAYS_READABLE_PATHS. The test cases added in JenkinsSEC2047Test.java verify that paths with protected prefixes (like 'login123') are now properly protected, confirming the vulnerability existed in this function.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.main:jenkins-core | maven | <= 2.263.1 | 2.263.2 |
| org.jenkins-ci.main:jenkins-core | maven | >= 2.264, <= 2.274 | 2.275 |
Ongoing coverage of React2Shell