GHSA-vpf7-q2rx-26mh

Suggest an improvement
Source
https://github.com/advisories/GHSA-vpf7-q2rx-26mh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-vpf7-q2rx-26mh/GHSA-vpf7-q2rx-26mh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vpf7-q2rx-26mh
Aliases
  • CVE-2022-36888
Published
2022-07-28T00:00:43Z
Modified
2024-02-16T08:08:46.256264Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Jenkins HashiCorp Vault Plugin does not perform permission checks in several HTTP endpoints that perform Vault connection tests
Details

A missing permission check in Jenkins HashiCorp Vault Plugin 354.vdb858fd6bf48 and earlier allows attackers with Overall/Read permission to obtain credentials stored in Vault with attacker-specified path and keys.

References

Affected packages

Maven / com.datapipe.jenkins.plugins:hashicorp-vault-plugin

Package

Name
com.datapipe.jenkins.plugins:hashicorp-vault-plugin
View open source insights on deps.dev
Purl
pkg:maven/com.datapipe.jenkins.plugins/hashicorp-vault-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
355.v3b_38d767a_b_a_8

Affected versions

1.*

1.0
1.1
1.2
1.3
1.4

2.*

2.0.0
2.0.1
2.1.0
2.1.1
2.2.0
2.3.0
2.3.1
2.4.0
2.5.0

3.*

3.0.0
3.1.0
3.1.1
3.2.0
3.3.0
3.4.0
3.4.1
3.5.0
3.6.0
3.6.1
3.7.0
3.8.0

336.*

336.v182c0fbaaeb7

351.*

351.vdb_f83a_1c6a_9d

354.*

354.vdb_858fd6b_f48

Database specific

{
    "last_known_affected_version_range": "<= 354.vdb"
}