An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 23 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Description An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-01-23T16:11:07.171Z

Reserved: 2025-01-21T12:41:49.874Z

Link: CVE-2025-24397

cve-icon Vulnrichment

Updated: 2025-01-23T16:10:58.849Z

cve-icon NVD

Status : Received

Published: 2025-01-22T17:15:13.670

Modified: 2025-01-23T17:15:27.643

Link: CVE-2025-24397

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.