First published: Wed Jan 12 2022(Updated: )
Jenkins SSH Agent Plugin prior to 1.23.2 and 1.22.1 does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An enumeration of credentials IDs in SSH Agent Plugin 1.23.2 and 1.22.1 requires the appropriate permissions.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ssh Agent | <=1.23 | |
maven/org.jenkins-ci.plugins:ssh-agent | <1.22.1 | 1.22.1 |
maven/org.jenkins-ci.plugins:ssh-agent | >=1.23<1.23.2 | 1.23.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20620 is rated as a high-severity vulnerability due to its potential to expose sensitive credentials.
To mitigate CVE-2022-20620, upgrade the SSH Agent Plugin to version 1.23.2 or 1.22.1.
CVE-2022-20620 allows attackers with overall/read access to enumerate credential IDs, increasing the risk of credential theft.
CVE-2022-20620 affects Jenkins SSH Agent Plugin versions prior to 1.23.2 and 1.22.1.
Users with Overall/Read access in Jenkins are impacted by CVE-2022-20620 due to the lack of permission checks.