[MAVEN:GHSA-32XP-M6VG-GWPJ] Missing permission check in Jenkins Pipeline Maven Integration Plugin allows enumerating credentials IDs
Severity
Moderate
Affected Packages
1
Fixed Packages
1
CVEs
1
Pipeline Maven Integration Plugin 3.8.2 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read access to Jenkins to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of credentials IDs in Pipeline Maven Integration Plugin 3.8.3 requires the appropriate permissions.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/pipeline-maven | < 3.8.3 |
Package | Fixed Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/pipeline-maven | = 3.8.3 |
- ID
- MAVEN:GHSA-32XP-M6VG-GWPJ
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-32xp-m6vg-gwpj
- Published
-
2022-05-24T17:25:24
(2 years ago) - Modified
-
2023-10-26T22:39:29
(10 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.plugins/pipeline-maven | org.jenkins-ci.plugins | pipeline-maven | < 3.8.3 | |||
Fixed | pkg:maven/org.jenkins-ci.plugins/pipeline-maven | org.jenkins-ci.plugins | pipeline-maven | = 3.8.3 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |