An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 03 Oct 2025 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins
Jenkins gitlab
CPEs cpe:2.3:a:jenkins:gitlab:*:*:*:*:*:jenkins:*:*
Vendors & Products Jenkins
Jenkins gitlab

Thu, 23 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Description An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-01-23T16:11:07.171Z

Reserved: 2025-01-21T12:41:49.874Z

Link: CVE-2025-24397

cve-icon Vulnrichment

Updated: 2025-01-23T16:10:58.849Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-22T17:15:13.670

Modified: 2025-10-03T00:19:00.040

Link: CVE-2025-24397

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.