vulnerability
Jenkins Advisory 2017-02-01: CVE-2017-2611: Insufficient permission check for periodic processes
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | Nov 13, 2017 | Nov 13, 2017 | Aug 11, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
Nov 13, 2017
Added
Nov 13, 2017
Modified
Aug 11, 2025
Description
Jenkins before versions 2.44, 2.32.2 is vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenkins to trigger these background processes (that are otherwise performed daily), possibly causing additional load on Jenkins master and agents.
Solutions
jenkins-lts-upgrade-2_32_2jenkins-upgrade-2_44
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.