-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:ssh2easy | maven | < 1.6 | 1.6 |
The vulnerability stems from missing enabled-status validation during permission assignment. The advisory explicitly states the plugin failed to verify if granted permissions were enabled. This would manifest in functions responsible for: 1) Directly granting permissions to users (grantPermissions), and 2) Persisting these assignments (applyConfiguration). The high confidence for grantPermissions aligns with core permission assignment logic, while medium confidence for applyConfiguration reflects configuration persistence patterns in Jenkins plugins. Both would appear in stack traces when processing authorization decisions for protected actions.
A Semantic Attack on Google Gemini - Read the Latest Research