First published: Tue May 17 2022(Updated: )
Jenkins GitLab Plugin 1.5.31 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:gitlab-plugin | <1.5.32 | 1.5.32 |
Jenkins GitLab | <=1.5.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30955 has a moderate severity rating due to the potential for credential ID enumeration.
To fix CVE-2022-30955, upgrade the Jenkins GitLab Plugin to version 1.5.32 or later.
The impact of CVE-2022-30955 allows unauthorized users with Overall/Read permission to enumerate stored credential IDs in Jenkins.
CVE-2022-30955 is present in Jenkins GitLab Plugin version 1.5.31 and earlier.
Attackers can exploit CVE-2022-30955 to obtain a list of credential IDs stored within Jenkins, potentially leading to further exploitation.