First published: Tue Mar 15 2022(Updated: )
A missing permission check in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:aws-credentials | <=189.v3551d5642995 | 191.vcb_f183ce58b_9 |
Jenkins CloudBees AWS Credentials | <191.vcb_f183ce58b_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27199 is rated as a medium severity vulnerability affecting Jenkins CloudBees AWS Credentials Plugin.
To remediate CVE-2022-27199, update the Jenkins CloudBees AWS Credentials Plugin to version 191.vcb_f183ce58b_9 or later.
CVE-2022-27199 affects users of Jenkins CloudBees AWS Credentials Plugin versions 189.v3551d5642995 and earlier.
CVE-2022-27199 is a missing permission check vulnerability that allows unauthorized AWS service connections.
An attacker must have Overall/Read permission in Jenkins to exploit CVE-2022-27199.