Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/04/21/2 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jenkins
Published: 2021-04-21T14:20:28
Updated: 2023-10-24T15:51:07.148Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21643
JSON object: View
NVD Information
Status : Modified
Published: 2021-04-21T15:15:08.340
Modified: 2023-10-25T18:16:48.810
Link: CVE-2021-21643
JSON object: View
Redhat Information
No data.
CWE
No CWE.