Missing Permission Checks in Jenkins CONS3RT Plugin
CVE-2022-41252
4.3MEDIUM
Summary
A vulnerability exists in the Jenkins CONS3RT Plugin that permits users with Overall/Read permission to enumerate credential IDs without adequate permission checks. This flaw could allow unauthorized access to sensitive credential information stored within Jenkins, increasing the risk of token exposure. Organizations using this plugin should evaluate their security posture and apply necessary updates to mitigate potential threats.
Affected Version(s)
Jenkins CONS3RT Plugin <= 1.0.0
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved