Missing Permission Checks in Jenkins CONS3RT Plugin Affecting Jenkins Users
CVE-2022-41254

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
21 September 2022

Summary

The Jenkins CONS3RT Plugin, up to version 1.0.0, is exposed due to missing permission checks. This flaw enables users with Overall/Read permission to connect to an arbitrary HTTP server with attacker-defined credentials. As a result, it allows malicious actors to capture and exploit sensitive information, including stored credentials in Jenkins, potentially leading to unauthorized access and security breaches.

Affected Version(s)

Jenkins CONS3RT Plugin <= 1.0.0

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.