Insufficient Permission Check in Jenkins Credentials Binding Plugin
CVE-2022-20616
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 January 2022
Summary
The Jenkins Credentials Binding Plugin versions 1.27 and earlier are susceptible to an improper permission check in a method responsible for form validation. This flaw enables attackers with Overall/Read access to ascertain whether a given credential ID corresponds to a secret file credential and to determine if the associated file is a zip file. This vulnerability could potentially lead to exposure of sensitive credential information, making it crucial for users of the plugin to update to non-vulnerable versions to maintain their security posture.
Affected Version(s)
Jenkins Credentials Binding Plugin <= 1.27
Jenkins Credentials Binding Plugin 1.24.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved