First published: Wed Jan 12 2022(Updated: )
A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Bitbucket Branch Source | <=2.9.10 | |
Jenkins Bitbucket Branch Source | =737.vdf9dc06105be | |
maven/org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source | <2.9.7.2 | 2.9.7.2 |
maven/org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source | >=2.9.8<2.9.11.2 | 2.9.11.2 |
maven/org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source | >=720.vbe985dd73d66<725.vd9f8be0fa250 | 725.vd9f8be0fa250 |
maven/org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source | >=726.v7e6f53de133c<746.v350d2781c184 | 746.v350d2781c184 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-20618 is rated as medium with a CVSS score of 4.3.
To fix CVE-2022-20618, upgrade Jenkins Bitbucket Branch Source Plugin to version 746.v350d2781c184 or later.
Several HTTP endpoints in Jenkins Bitbucket Branch Source Plugin are affected by CVE-2022-20618, where permission checks are not performed.
Attackers with Overall/Read access can enumerate credential IDs of credentials stored in Jenkins due to the vulnerability in CVE-2022-20618.