Missing Permission Check in Jenkins Vault Plugin Exposes Sensitive Data
CVE-2022-36888
6.5MEDIUM
Summary
A significant vulnerability exists in the Jenkins HashiCorp Vault Plugin which fails to enforce proper permissions. This flaw allows users with Overall/Read permission to exploit the system and gain unauthorized access to credentials stored in the Vault. By specifying paths and keys, attackers can retrieve sensitive data, compromising the security of the Jenkins environment.
Affected Version(s)
Jenkins HashiCorp Vault Plugin <= 354.vdb_858fd6b_f48
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved