Description
Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2206 | Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins. |
Github GHSA |
GHSA-3m3f-2323-64m7 | Incorrect permission checks in Jenkins Config File Provider Plugin allow enumerating credentials IDs |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T18:16:23.896Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21643
No data.
Status : Modified
Published: 2021-04-21T15:15:08.340
Modified: 2024-11-21T05:48:45.340
Link: CVE-2021-21643
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA