First published: Wed Jan 12 2022(Updated: )
Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Credentials Binding | <=1.27 | |
maven/org.jenkins-ci.plugins:credentials-binding | <1.24.1 | 1.24.1 |
maven/org.jenkins-ci.plugins:credentials-binding | >=1.25<1.27.1 | 1.27.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20616 is considered a medium severity vulnerability.
To fix CVE-2022-20616, update the Jenkins Credentials Binding Plugin to version 1.27.1 or later.
CVE-2022-20616 affects Jenkins Credentials Binding Plugin versions 1.27 and earlier.
CVE-2022-20616 allows attackers with Overall/Read access to validate credential IDs and check if they refer to secret file credentials.
CVE-2022-20616 was disclosed on January 12, 2022.