logo

CVE-2022-25186 com.datapipe.jenkins.plugins:hashicorp-vault-plugin

Package

Manager: maven
Name: com.datapipe.jenkins.plugins:hashicorp-vault-plugin
Vulnerable Version: >=0 <336.v182c0fbaaeb7

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00623 pctl0.69219

Details

Agent-to-controller security bypass in Jenkins HashiCorp Vault Plugin Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key.

Metadata

Created: 2022-02-16T00:01:28Z
Modified: 2022-12-01T23:35:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-fm6q-97gw-c4wh/GHSA-fm6q-97gw-c4wh.json
CWE IDs: ["CWE-693"]
Alternative ID: GHSA-fm6q-97gw-c4wh
Finding: F115
Auto approve: 1