Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429 | Issue Tracking Vendor Advisory |
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429 | Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429 - Issue Tracking, Vendor Advisory |
15 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429 - Issue Tracking, Vendor Advisory |
Information
Published : 2022-02-15 17:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-25186
Mitre link : CVE-2022-25186
CVE.ORG link : CVE-2022-25186
JSON object : View
Products Affected
jenkins
- hashicorp_vault
CWE