-
CVSS Score
-The vulnerability explicitly involves an unauthenticated HTTP endpoint for credential ID enumeration. In Jenkins plugins, such endpoints are typically implemented as do[Action] methods in DescriptorImpl classes. The advisory specifies the flaw was fixed by adding permission checks in v4.5.3, which aligns with Jenkins' pattern of securing descriptor methods with @RequirePermission or explicit checkPermission calls. The function name and location are inferred from standard plugin architecture and the credential enumeration context.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkinsci.plugins:octoperf | maven | <= 4.5.2 | 4.5.3 |
A Semantic Attack on Google Gemini - Read the Latest Research