logo

CVE-2022-41252 org.jenkins-ci.plugins:cons3rt

Package

Manager: maven
Name: org.jenkins-ci.plugins:cons3rt
Vulnerable Version: >=0 <=1.0.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00589 pctl0.68224

Details

Missing permission checks in Jenkins CONS3RT Plugin allow enumerating credentials IDs CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.

Metadata

Created: 2022-09-22T00:00:26Z
Modified: 2022-12-06T00:51:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-p37p-wg92-2fc4/GHSA-p37p-wg92-2fc4.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-p37p-wg92-2fc4
Finding: F039
Auto approve: 1