File Path Disclosure in Jenkins Openstack Heat Plugin by CloudBees
CVE-2022-36913

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
27 July 2022

Summary

The Jenkins Openstack Heat Plugin versions 1.5 and earlier lack adequate permission checks during form validation methods. This weakness allows authenticated users with Overall/Read permissions to verify the existence of a specified file path on the Jenkins controller file system. Exploitation could lead to sensitive information exposure, potentially compromising the security of the server.

Affected Version(s)

Jenkins Openstack Heat Plugin <= 1.5

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.