-
CVSS Score
-The vulnerability stems from an HTTP endpoint that lists pending requests without proper authorization. Jenkins plugins typically implement such endpoints via actions extending Action/ExtensionPoint. The advisory explicitly mentions missing permission checks in an endpoint, which aligns with the handleRequest method in RRODAction being responsible for serving the administrative page. The confidence is high because this pattern matches Jenkins plugin architecture and the described vulnerability mechanism (CWE-863).
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:rrod | maven | <= 1.1.0 |