Lucene search

K
githubGitHub Advisory DatabaseGHSA-66HV-FHCM-7XM7
HistoryOct 25, 2023 - 6:32 p.m.

Jenkins Warnings Plugin exposures system-scoped credentials

2023-10-2518:32:25
CWE-200
CWE-522
GitHub Advisory Database
github.com
13
jenkins
warnings plugin
system-scoped credentials
security
vulnerability

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

21.4%

Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing the use of system-scoped credentials otherwise reserved for the global configuration.

This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to.

Warnings Plugin 10.5.1 defines the appropriate context for credentials lookup. This fix has been backported to 10.4.1.

Affected configurations

Vulners
Node
io.jenkins.pluginswarnings-ngRange<10.4.1
OR
io.jenkins.pluginswarnings-ngMatch10.5.0
VendorProductVersionCPE
io.jenkins.pluginswarnings-ng*cpe:2.3:a:io.jenkins.plugins:warnings-ng:*:*:*:*:*:*:*:*
io.jenkins.pluginswarnings-ng10.5.0cpe:2.3:a:io.jenkins.plugins:warnings-ng:10.5.0:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

21.4%