GHSA-gf8w-6hcm-rh3j

Suggest an improvement
Source
https://github.com/advisories/GHSA-gf8w-6hcm-rh3j
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-gf8w-6hcm-rh3j/GHSA-gf8w-6hcm-rh3j.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gf8w-6hcm-rh3j
Aliases
  • CVE-2020-2313
Published
2022-05-24T17:33:08Z
Modified
2024-02-16T08:08:27.886981Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Missing permission checks in Jenkins Azure Key Vault Plugin allow enumerating credentials IDs
Details

Jenkins Azure Key Vault Plugin 2.0 and earlier does not perform permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.

An enumeration of credentials IDs in Jenkins Azure Key Vault Plugin 2.1 requires the appropriate permissions.

Database specific
{
    "nvd_published_at": "2020-11-04T15:15:00Z",
    "cwe_ids": [
        "CWE-862"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-22T13:40:48Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:azure-keyvault

Package

Name
org.jenkins-ci.plugins:azure-keyvault
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/azure-keyvault

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1

Affected versions

0.*

0.10.0

1.*

1.0.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9

2.*

2.0