First published: Wed Oct 19 2022(Updated: )
Jenkins Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Katalon | <1.0.33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jenkins Katalon Plugin vulnerability is CVE-2022-43417.
The severity of CVE-2022-43417 is medium.
Jenkins Katalon Plugin versions up to and excluding 1.0.33 are affected by CVE-2022-43417.
No, Jenkins Katalon Plugin 1.0.32 and earlier do not perform permission checks in several HTTP endpoints.
An attacker with Overall/Read permission can connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins Katalon Plugin 1.0.32 and earlier.