CVE-2022-25201 – com.checkmarx.jenkins:checkmarx
Package
Manager: maven
Name: com.checkmarx.jenkins:checkmarx
Vulnerable Version: >=0 <2022.1.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00113 pctl0.30603
Details
Missing permission checks in Jenkins Checkmarx Plugin allow capturing credentials Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Metadata
Created: 2022-02-16T00:01:19Z
Modified: 2022-12-01T22:23:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-wwf6-x2rv-vxqh/GHSA-wwf6-x2rv-vxqh.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-wwf6-x2rv-vxqh
Finding: F039
Auto approve: 1