The host is installed with Jenkins LTS through 2.89.3 or Jenkins rolling release through 2.106 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle improper authorizations. Successful exploitation could allow attackers to an attacker to have jenkins submit http get requests and get limited information about the response.