First published: Wed Nov 04 2020(Updated: )
Jenkins Ansible Plugin 1.0 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An enumeration of credentials IDs in Ansible Plugin 1.1 requires the appropriate permissions.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ansible | <=1.0 | |
maven/org.jenkins-ci.plugins:ansible | <=1.0 | 1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2310 is classified as a High severity vulnerability due to its potential to expose sensitive credential information.
To fix CVE-2020-2310, upgrade the Jenkins Ansible Plugin to version 1.1 or later.
CVE-2020-2310 can be exploited by attackers with Overall/Read permission in Jenkins.
CVE-2020-2310 allows attackers to enumerate IDs of stored credentials in Jenkins.
CVE-2020-2310 exists in Jenkins Ansible Plugin versions 1.0 and earlier.