Lucene search

K
githubGitHub Advisory DatabaseGHSA-76PG-MR9V-5VWC
HistoryJul 28, 2022 - 12:00 a.m.

Jenkins Repository Connector Plugin allows attackers with Overall/Read permission to enumerate credentials IDs

2022-07-2800:00:42
CWE-862
GitHub Advisory Database
github.com
13
jenkins
repository connector
permission checks
http endpoints
overall/read
credentials ids
vulnerability
fix
advisory

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

22.0%

Jenkins Repository Connector Plugin 2.2.0 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.

As of publication of this advisory, there is no fix.

Affected configurations

Vulners
Node
org.jenkins-ci.pluginsrepository-connectorRange2.2.0
VendorProductVersionCPE
org.jenkins-ci.pluginsrepository-connector*cpe:2.3:a:org.jenkins-ci.plugins:repository-connector:*:*:*:*:*:*:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

22.0%

Related for GHSA-76PG-MR9V-5VWC