Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-27pr-r7hm-c2rc

Опубликовано: 19 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 4.2

Описание

Missing permission check in Jenkins Dimensions Plugin allows enumerating credentials IDs

Dimensions Plugin 0.9.3 and earlier does not perform a permission check in an HTTP endpoint.

This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.

An enumeration of credentials IDs in Dimensions Plugin 0.9.3.1 requires the appropriate permissions.

Пакеты

Наименование

org.jenkins-ci.plugins:dimensionsscm

maven
Затронутые версииВерсия исправления

<= 0.9.3

0.9.3.1

EPSS

Процентиль: 49%
0.00255
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 4.2
redhat
около 2 лет назад

A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. See the following Jenkins security advisory for details: * https://www.jenkins.io/security/advisory/2023-06-14/ https://www.jenkins.io/security/advisory/2023-06-14/

CVSS3: 4.2
nvd
около 2 лет назад

A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. See the following Jenkins security advisory for details: * https://www.jenkins.io/security/advisory/2023-06-14/ https://www.jenkins.io/security/advisory/2023-06-14/

CVSS3: 4.2
fstec
около 2 лет назад

Уязвимость плагина Dimensions сервера автоматизации Jenkins, связанная с недостатками разграничения доступа, позволяющая нарушителю получить доступ к конфиденциальной информации

EPSS

Процентиль: 49%
0.00255
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-863