Jenkins SSH Plugin Vulnerability Allows Unauthorized Access to Stored Credentials
CVE-2022-30959
6.5MEDIUM
Summary
A flaw in the Jenkins SSH Plugin prior to version 2.6.1 allows attackers with Overall/Read permissions to connect to arbitrary SSH servers. By exploiting this vulnerability, attackers can use their own credentials or specific credential IDs obtained through alternative means to capture sensitive information stored within Jenkins. This exposes critical vulnerabilities that could lead to further attacks on the Jenkins server and its associated infrastructure.
Affected Version(s)
Jenkins SSH Plugin <= 2.6.1
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved