### [CVE-2024-2216](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2216) ![](https://img.shields.io/static/v1?label=Product&message=Jenkins%20docker-build-step%20Plugin&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%202.11%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description A missing permission check in an HTTP endpoint in Jenkins docker-build-step Plugin 2.11 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified TCP or Unix socket URL, and to reconfigure the plugin using the provided connection test parameters, affecting future build step executions. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds