CVE-2023-30522
Description
A missing permission check in Jenkins Fogbugz Plugin 2.2.17 and earlier allows attackers with Item/Read permission to trigger builds of jobs specified in a 'jobname' request parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing permission check in Jenkins Fogbugz Plugin ≤2.2.17 allows attackers with Item/Read to trigger builds of arbitrary jobs via 'jobname' parameter.
The Fogbugz Plugin for Jenkins lacks a permission check when processing requests to trigger builds. This allows an attacker with Item/Read permission to specify a job via the 'jobname' request parameter and trigger a build of that job, even without the necessary Build or Run permissions [1].\n\nAn attacker only needs Item/Read permission, a low-level permission often granted to many users. They can send a crafted HTTP request to the plugin's endpoint, setting the 'jobname' parameter to any job on the Jenkins instance. No further authentication is required. This can be done remotely if the Jenkins instance is network-accessible [3].\n\nThe impact includes unauthorized triggering of builds, potentially leading to resource exhaustion, disruption of pipeline execution, or triggering downstream actions that could have security implications. This vulnerability is rated as medium severity [1].\n\nThe vulnerability affects Fogbugz Plugin version 2.2.17 and earlier. As of the advisory, no fix has been released; the plugin is listed as unresolved. Mitigations include restricting Item/Read permissions or removing the plugin if not essential. Users should monitor for updates from the Jenkins project [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:fogbugzMaven | <= 2.2.17 | — |
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-2482-gr3v-f3f3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-30522ghsaADVISORY
- www.jenkins.io/security/advisory/2023-04-12/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2023/04/13/3ghsaWEB
News mentions
1- Jenkins Security Advisory 2023-04-12Jenkins Security Advisories · Apr 12, 2023