CVE-2022-36921

A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:coverity:*:*:*:*:*:jenkins:*:*

History

02 Nov 2023, 20:52

Type Values Removed Values Added
CWE CWE-862
References (MISC) https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20%282%29 - (MISC) https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20%282%29 - Vendor Advisory

25 Oct 2023, 18:17

Type Values Removed Values Added
CWE CWE-862
References
  • {'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(2)', 'name': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(2)', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • (MISC) https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20%282%29 -

Information

Published : 2022-07-27 15:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-36921

Mitre link : CVE-2022-36921

CVE.ORG link : CVE-2022-36921


JSON object : View

Products Affected

jenkins

  • coverity
CWE
CWE-862

Missing Authorization