GHSA-8p4m-62gp-33j4

Suggest an improvement
Source
https://github.com/advisories/GHSA-8p4m-62gp-33j4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8p4m-62gp-33j4/GHSA-8p4m-62gp-33j4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8p4m-62gp-33j4
Aliases
Published
2022-05-24T17:08:46Z
Modified
2023-11-08T04:02:50.989935Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Users with Overall/Read access can enumerate credential IDs in Pipeline GitHub Notify Step Plugin
Details

Pipeline GitHub Notify Step Plugin 1.0.4 and earlier provides a list of applicable credential IDs to allow users configuring the plugin to select the one to use.

This functionality does not correctly check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those can be used as part of an attack to capture the credentials using another vulnerability.

An enumeration of credentials IDs in Pipeline GitHub Notify Step Plugin 1.0.5 requires the permission to configure a project.

Database specific
{
    "nvd_published_at": "2020-02-12T15:15:00Z",
    "github_reviewed_at": "2023-01-14T05:26:54Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-285"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins:pipeline-build-step

Package

Name
org.jenkins-ci.plugins:pipeline-build-step
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/pipeline-build-step

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.5