Lack of Permission Check in Jenkins GitLab Plugin Affects User Credentials
CVE-2019-10301
8.8HIGH
Summary
A missing permission check in the Jenkins GitLab Plugin prior to version 1.5.12 exposes credentials to potential attackers. This flaw allows users with Overall/Read permissions to establish connections to any specified URL with attacker-controlled credential IDs. This vulnerability poses a risk as it enables unauthorized access to sensitive data stored within Jenkins.
Affected Version(s)
Jenkins GitLab Plugin 1.5.11 and earlier
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved