Unauthorized Credential Enumeration in Jenkins Coverity Plugin
CVE-2022-36919
4.3MEDIUM
Summary
A missing permission check in the Jenkins Coverity Plugin (versions 1.11.4 and earlier) can be exploited by attackers with Overall/Read permissions. This flaw allows them to enumerate the IDs of stored credentials within Jenkins, potentially leading to unauthorized access and data leaks. Organizations utilizing this plugin should assess their security posture and apply the necessary updates to mitigate this vulnerability.
Affected Version(s)
Jenkins Coverity Plugin <= 1.11.4
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved