File Path Disclosure in Jenkins Openstack Heat Plugin by CloudBees
CVE-2022-36913
4.3MEDIUM
Summary
The Jenkins Openstack Heat Plugin versions 1.5 and earlier lack adequate permission checks during form validation methods. This weakness allows authenticated users with Overall/Read permissions to verify the existence of a specified file path on the Jenkins controller file system. Exploitation could lead to sensitive information exposure, potentially compromising the security of the server.
Affected Version(s)
Jenkins Openstack Heat Plugin <= 1.5
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved