Permissions, Privileges, and Access Controls in Configuration as Code - CVE-2019-10344
Published: October 4, 2019
Configuration as Code
Detailed vulnerability description
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to missing permission checks in various HTTP endpoints. A remote authenticated attacker with Overall/Read access can access the generated schema and documentation for this plugin containing detailed information about installed plugins.