{"vulnerability": "CVE-2024-47804", "sightings": [{"uuid": "3383353f-b8a9-4569-9cc7-014674716b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47804", "type": "seen", "source": "https://t.me/cvedetector/6839", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47804 - Jenkins Item Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47804 \nPublished : Oct. 2, 2024, 4:15 p.m. | 33\u00a0minutes ago \nDescription : If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-02T18:52:18.000000Z"}]}