CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-2216: A missing permission check in an HTTP endpoint in Jenkins docker-build-step Plugin 2.11 and earlier allows attackers with Overall/Read permission...

Description

A missing permission check in an HTTP endpoint in Jenkins docker-build-step Plugin 2.11 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified TCP or Unix socket URL, and to reconfigure the plugin using the provided connection test parameters, affecting future build step executions.

Classification

CVE ID: CVE-2024-2216

Affected Products

Vendor: Jenkins Project

Product: Jenkins docker-build-step Plugin

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.98% (scored less or equal to compared to others)

EPSS Date: 2025-03-14 (when was this score calculated)

References

https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3200
http://www.openwall.com/lists/oss-security/2024/03/06/3

Timeline