Lucene search

K
githubGitHub Advisory DatabaseGHSA-6J27-3XFW-CJ2W
HistoryJan 26, 2023 - 9:30 p.m.

Missing permissions check in Jenkins JIRA Pipeline Steps Plugin

2023-01-2621:30:18
CWE-862
GitHub Advisory Database
github.com
17
jenkins
jira
pipeline
permission check
vulnerability
credentials capture

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

27.6%

A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Affected configurations

Vulners
Node
org.jenkinsci.plugins\Matchjira

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

27.6%

Related for GHSA-6J27-3XFW-CJ2W