An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
Jenkins Matrix Authorization Strategy Plugin 2.6.1 and earlier does not escape user names shown in the configuration, resulting in a stored cross-site scripting vulnerability.
Vulnerable Library - matrix-auth-1.3.jar
Offers matrix-based security authorization strategies (global and per-project).
Library home page: http://wiki.jenkins-ci.org/display/JENKINS/Matrix+Authorization+Strategy+Plugin
Path to dependency file: /build.gradle
Path to vulnerable library: /build.gradle
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2021-21623
### Vulnerable Library - matrix-auth-1.3.jarOffers matrix-based security authorization strategies (global and per-project).
Library home page: http://wiki.jenkins-ci.org/display/JENKINS/Matrix+Authorization+Strategy+Plugin
Path to dependency file: /build.gradle
Path to vulnerable library: /build.gradle
Dependency Hierarchy: - :x: **matrix-auth-1.3.jar** (Vulnerable Library)
Found in base branch: master
### Vulnerability DetailsAn incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
Publish Date: 2021-03-18
URL: CVE-2021-21623
### CVSS 3 Score Details (6.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2180
Release Date: 2021-03-18
Fix Resolution: org.jenkins-ci.plugins:matrix-auth:2.6.6
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.CVE-2020-2226
### Vulnerable Library - matrix-auth-1.3.jarOffers matrix-based security authorization strategies (global and per-project).
Library home page: http://wiki.jenkins-ci.org/display/JENKINS/Matrix+Authorization+Strategy+Plugin
Path to dependency file: /build.gradle
Path to vulnerable library: /build.gradle
Dependency Hierarchy: - :x: **matrix-auth-1.3.jar** (Vulnerable Library)
Found in base branch: master
### Vulnerability DetailsJenkins Matrix Authorization Strategy Plugin 2.6.1 and earlier does not escape user names shown in the configuration, resulting in a stored cross-site scripting vulnerability.
Publish Date: 2020-07-15
URL: CVE-2020-2226
### CVSS 3 Score Details (5.4)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2020-07-15/
Release Date: 2020-07-15
Fix Resolution: org.jenkins-ci.plugins:matrix-auth:2.6.2
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.