Improper access control in Perfecto - CVE-2020-2260
Published: September 16, 2020 / Updated: September 22, 2020
Perfecto
Jenkins
Description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to the affected plugin does not perform a permission check in a method implementing a connection test. A remote user with Overall/Read permission can connect to an attacker-specified HTTP URL using attacker-specified username and password.