Missing Permission Checks in Jenkins CONS3RT Plugin Affecting Jenkins Users
CVE-2022-41254
6.5MEDIUM
Summary
The Jenkins CONS3RT Plugin, up to version 1.0.0, is exposed due to missing permission checks. This flaw enables users with Overall/Read permission to connect to an arbitrary HTTP server with attacker-defined credentials. As a result, it allows malicious actors to capture and exploit sensitive information, including stored credentials in Jenkins, potentially leading to unauthorized access and security breaches.
Affected Version(s)
Jenkins CONS3RT Plugin <= 1.0.0
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved