Incorrect permission checks in Jenkins Config File Provider Plugin allow enumerating credentials IDs
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 7, 2023
Package
Affected versions
<= 3.7.0
Patched versions
3.7.1
Description
Published by the National Vulnerability Database
Apr 21, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 13, 2022
Last updated
Dec 7, 2023
Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints.
This allows attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of system-scoped credentials IDs in Jenkins Config File Provider Plugin 3.7.1 requires Overall/Administer permission.
References