First published: Tue Mar 29 2022(Updated: )
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.surenpi.jenkins:phoenix-autotest | <=1.3 | |
Jenkins Pipeline | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28158 is classified as a high severity vulnerability due to its potential impact on credential leakage in Jenkins.
To fix CVE-2022-28158, update Jenkins Pipeline: Phoenix AutoTest Plugin to version 1.4 or later.
CVE-2022-28158 allows attackers with Overall/Read permission to enumerate stored credential IDs, posing a risk of unauthorized access.
Yes, CVE-2022-28158 can be exploited remotely by authenticated users with minimal permissions.
Versions 1.3 and earlier of the Jenkins Pipeline: Phoenix AutoTest Plugin are affected by CVE-2022-28158.