Missing Permission Check in Jenkins OpenShift Deployer Plugin
CVE-2022-36907

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
27 July 2022

Summary

The Jenkins OpenShift Deployer Plugin has a significant vulnerability due to a missing permission check, allowing attackers with Overall/Read permission to establish a connection to an arbitrary URL specified by the attacker. This issue permits the use of attacker-defined usernames and passwords, potentially compromising system security and exposing sensitive information. It is crucial for Jenkins users to review their plugin configurations and apply recommended updates to mitigate possible exploits.

Affected Version(s)

Jenkins OpenShift Deployer Plugin <= 1.2.0

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.