First published: Wed Oct 19 2022(Updated: )
Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:job-import-plugin | <=3.5 | 3.6 |
Jenkins Job Import | <3.6 | |
<3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43413 is considered a medium severity vulnerability due to its potential for credential ID enumeration.
To fix CVE-2022-43413, upgrade to Jenkins Job Import Plugin version 3.6 or later.
The impact of CVE-2022-43413 allows attackers with Overall/Read permission to enumerate credential IDs, potentially exposing sensitive information.
Jenkins Job Import Plugin versions 3.5 and earlier are affected by CVE-2022-43413.
CVE-2022-43413 is considered a local vulnerability as it requires Overall/Read permission within Jenkins.