Jenkins Coverity Plugin Vulnerability Exposes User Credentials
CVE-2022-36921
8.1HIGH
Summary
A vulnerability in the Jenkins Coverity Plugin permits attackers with Overall/Read permissions to connect to unauthorized URLs using compromised credential IDs. This flaw potentially leads to unauthorized access and exposure of sensitive credentials stored in Jenkins, as attackers can manipulate the connection parameters to retrieve confidential information without appropriate authorization.
Affected Version(s)
Jenkins Coverity Plugin <= 1.11.4
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved