-
CVSS Score
-The vulnerability stems from a missing authorization check in an HTTP endpoint handling email functionality. Jenkins plugins typically implement HTTP endpoints via do* methods in Java classes. The advisory explicitly states the endpoint lacked permission validation, which would manifest as a missing checkPermission() call in the handler method. While exact method names aren't provided, the pattern matches Jenkins plugin architecture where email actions would be handled by a method like doSendTestEmail in an EmailAction class. The high confidence comes from the clear vulnerability pattern (missing auth check in HTTP endpoint) matching Jenkins security best practices.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:requests | maven | <= 2.2.7 | 2.2.8 |
A Semantic Attack on Google Gemini - Read the Latest Research