Vulnerability Details CVE-2022-45383
An incorrect permission check in Jenkins Support Core Plugin 1206.v14049fa_b_d860 and earlier allows attackers with Support/DownloadBundle permission to download a previously created support bundle containing information limited to users with Overall/Administer permission.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 19.9%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2022-45383
-
cpe:2.3:a:jenkins:support_core:-
-
cpe:2.3:a:jenkins:support_core:1.0
-
cpe:2.3:a:jenkins:support_core:1.1
-
cpe:2.3:a:jenkins:support_core:1.2
-
cpe:2.3:a:jenkins:support_core:1.3
-
cpe:2.3:a:jenkins:support_core:1.4
-
cpe:2.3:a:jenkins:support_core:1.5
-
cpe:2.3:a:jenkins:support_core:1.6
-
cpe:2.3:a:jenkins:support_core:1.7
-
cpe:2.3:a:jenkins:support_core:1.8
-
cpe:2.3:a:jenkins:support_core:2.0
-
cpe:2.3:a:jenkins:support_core:2.1
-
cpe:2.3:a:jenkins:support_core:2.10
-
cpe:2.3:a:jenkins:support_core:2.11
-
cpe:2.3:a:jenkins:support_core:2.12
-
cpe:2.3:a:jenkins:support_core:2.13
-
cpe:2.3:a:jenkins:support_core:2.14
-
cpe:2.3:a:jenkins:support_core:2.15
-
cpe:2.3:a:jenkins:support_core:2.16
-
cpe:2.3:a:jenkins:support_core:2.17
-
cpe:2.3:a:jenkins:support_core:2.18
-
cpe:2.3:a:jenkins:support_core:2.19
-
cpe:2.3:a:jenkins:support_core:2.2
-
cpe:2.3:a:jenkins:support_core:2.20
-
cpe:2.3:a:jenkins:support_core:2.21
-
cpe:2.3:a:jenkins:support_core:2.22
-
cpe:2.3:a:jenkins:support_core:2.23
-
cpe:2.3:a:jenkins:support_core:2.24
-
cpe:2.3:a:jenkins:support_core:2.25
-
cpe:2.3:a:jenkins:support_core:2.27
-
cpe:2.3:a:jenkins:support_core:2.28
-
cpe:2.3:a:jenkins:support_core:2.29
-
cpe:2.3:a:jenkins:support_core:2.3
-
cpe:2.3:a:jenkins:support_core:2.30
-
cpe:2.3:a:jenkins:support_core:2.31
-
cpe:2.3:a:jenkins:support_core:2.32
-
cpe:2.3:a:jenkins:support_core:2.33
-
cpe:2.3:a:jenkins:support_core:2.34
-
cpe:2.3:a:jenkins:support_core:2.35
-
cpe:2.3:a:jenkins:support_core:2.36
-
cpe:2.3:a:jenkins:support_core:2.37
-
cpe:2.3:a:jenkins:support_core:2.38
-
cpe:2.3:a:jenkins:support_core:2.39
-
cpe:2.3:a:jenkins:support_core:2.4
-
cpe:2.3:a:jenkins:support_core:2.40
-
cpe:2.3:a:jenkins:support_core:2.41
-
cpe:2.3:a:jenkins:support_core:2.42
-
cpe:2.3:a:jenkins:support_core:2.43
-
cpe:2.3:a:jenkins:support_core:2.44
-
cpe:2.3:a:jenkins:support_core:2.45
-
cpe:2.3:a:jenkins:support_core:2.45.1
-
cpe:2.3:a:jenkins:support_core:2.46
-
cpe:2.3:a:jenkins:support_core:2.47
-
cpe:2.3:a:jenkins:support_core:2.48
-
cpe:2.3:a:jenkins:support_core:2.49
-
cpe:2.3:a:jenkins:support_core:2.5
-
cpe:2.3:a:jenkins:support_core:2.50
-
cpe:2.3:a:jenkins:support_core:2.51
-
cpe:2.3:a:jenkins:support_core:2.52
-
cpe:2.3:a:jenkins:support_core:2.53
-
cpe:2.3:a:jenkins:support_core:2.54
-
cpe:2.3:a:jenkins:support_core:2.55
-
cpe:2.3:a:jenkins:support_core:2.56
-
cpe:2.3:a:jenkins:support_core:2.56.1
-
cpe:2.3:a:jenkins:support_core:2.57
-
cpe:2.3:a:jenkins:support_core:2.58
-
cpe:2.3:a:jenkins:support_core:2.59
-
cpe:2.3:a:jenkins:support_core:2.6
-
cpe:2.3:a:jenkins:support_core:2.60
-
cpe:2.3:a:jenkins:support_core:2.61
-
cpe:2.3:a:jenkins:support_core:2.62
-
cpe:2.3:a:jenkins:support_core:2.62.1
-
cpe:2.3:a:jenkins:support_core:2.63
-
cpe:2.3:a:jenkins:support_core:2.64
-
cpe:2.3:a:jenkins:support_core:2.68.1
-
cpe:2.3:a:jenkins:support_core:2.7
-
cpe:2.3:a:jenkins:support_core:2.70.1
-
cpe:2.3:a:jenkins:support_core:2.72
-
cpe:2.3:a:jenkins:support_core:2.72.1
-
cpe:2.3:a:jenkins:support_core:2.74
-
cpe:2.3:a:jenkins:support_core:2.75
-
cpe:2.3:a:jenkins:support_core:2.76
-
cpe:2.3:a:jenkins:support_core:2.76.1
-
cpe:2.3:a:jenkins:support_core:2.77
-
cpe:2.3:a:jenkins:support_core:2.78
-
cpe:2.3:a:jenkins:support_core:2.79
-
cpe:2.3:a:jenkins:support_core:2.79.1
-
cpe:2.3:a:jenkins:support_core:2.8
-
cpe:2.3:a:jenkins:support_core:2.80
-
cpe:2.3:a:jenkins:support_core:2.9