First published: Wed Aug 12 2020(Updated: )
A missing permission check in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Pipeline Maven Integration | <=3.8.2 | |
maven/org.jenkins-ci.plugins:pipeline-maven | <3.8.3 | 3.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-2233 is medium with a CVSS score of 6.5.
CVE-2020-2233 affects Jenkins Pipeline Maven Integration Plugin version 3.8.2 and earlier.
CVE-2020-2233 allows attackers with Overall/Read access to Jenkins to enumerate credentials IDs of credentials stored in Jenkins.
To fix CVE-2020-2233, update Jenkins Pipeline Maven Integration Plugin to version 3.8.3 or later.
You can find more information about CVE-2020-2233 on the following references: [1](http://www.openwall.com/lists/oss-security/2020/08/12/4), [2](https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20(1)), [3](https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20%281%29).