Insufficient Permission Check in Jenkins Credentials Binding Plugin
CVE-2022-20616

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 January 2022

Summary

The Jenkins Credentials Binding Plugin versions 1.27 and earlier are susceptible to an improper permission check in a method responsible for form validation. This flaw enables attackers with Overall/Read access to ascertain whether a given credential ID corresponds to a secret file credential and to determine if the associated file is a zip file. This vulnerability could potentially lead to exposure of sensitive credential information, making it crucial for users of the plugin to update to non-vulnerable versions to maintain their security posture.

Affected Version(s)

Jenkins Credentials Binding Plugin <= 1.27

Jenkins Credentials Binding Plugin 1.24.1

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.