Missing Permission Check in Jenkins Azure Key Vault Plugin Exposes Sensitive Credential IDs
CVE-2020-2313
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 4 November 2020
Summary
The Jenkins Azure Key Vault Plugin prior to version 2.0 reveals a serious flaw due to a missing permission check. This vulnerability permits users with Overall/Read permissions to enumerate the IDs of credentials stored within Jenkins, potentially exposing sensitive information and leading to unauthorized access to protected resources.
Affected Version(s)
Jenkins Azure Key Vault Plugin <= 2.0
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved