Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2206 Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins.
Github GHSA Github GHSA GHSA-3m3f-2323-64m7 Incorrect permission checks in Jenkins Config File Provider Plugin allow enumerating credentials IDs
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-03T18:16:23.896Z

Reserved: 2021-01-04T00:00:00

Link: CVE-2021-21643

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-21T15:15:08.340

Modified: 2024-11-21T05:48:45.340

Link: CVE-2021-21643

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-04-21T00:00:00Z

Links: CVE-2021-21643 - Bugzilla

cve-icon OpenCVE Enrichment

No data.