[JENKINS:SECURITY-2522-1] Agent-to-controller security bypass in `conjur-credentials` allows decrypting secrets

Severity Medium
Affected Packages 2
CVEs 1

conjur-credentials 1.0.9 and earlier implements functionality that allows agent processes to obtain the plain text of any attacker-provided encrypted secret.

This allows attackers able to control agent processes to decrypt secrets stored in Jenkins obtained through another method.

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-2522-1
Severity
medium
Published
2022-01-12T00:00:00
(2 years ago)
Modified
2022-01-12T00:00:00
(2 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository conjur-credentials repository https://github.com/jenkinsci/conjur-credentials-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/conjur-credentials org.jenkins-ci.plugins conjur-credentials <= 1.0.9
Affected pkg:github/jenkinsci/conjur-credentials-plugin jenkinsci conjur-credentials-plugin <= 1.0.9
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...