First published: Thu Jun 30 2022(Updated: )
A missing permission check in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Xebialabs Xl Release | <=22.0.0 | |
Jenkins Xebialabs Xl Release | <22.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the missing permission check in Jenkins XebiaLabs XL Release Plugin is CVE-2022-34779.
The severity of CVE-2022-34779 is medium with a severity value of 6.5.
The affected software is Jenkins XebiaLabs XL Release Plugin version up to 22.0.0 (inclusive) and up to 22.0.1 (exclusive).
An attacker with Overall/Read permission can exploit this vulnerability to enumerate credentials IDs of credentials stored in Jenkins.
Yes, you can find references for CVE-2022-34779 at the following links: [link1](https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(1)), [link2](https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20%281%29).