Описание
A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.157.1 (включая)
cpe:2.3:a:jenkins:team_foundation_server:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 15%
0.00048
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-862
Связанные уязвимости
CVSS3: 6.5
github
больше 3 лет назад
Missing permission check in Jenkins Team Foundation Server Plugin allow capturing credentials
EPSS
Процентиль: 15%
0.00048
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-862