Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04cDRtLTYyZ3AtMzNqNM4AAjkR
Users with Overall/Read access can enumerate credential IDs in Pipeline GitHub Notify Step Plugin
Pipeline GitHub Notify Step Plugin 1.0.4 and earlier provides a list of applicable credential IDs to allow users configuring the plugin to select the one to use.
This functionality does not correctly check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of credentials IDs in Pipeline GitHub Notify Step Plugin 1.0.5 requires the permission to configure a project.
Permalink: https://github.com/advisories/GHSA-8p4m-62gp-33j4JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04cDRtLTYyZ3AtMzNqNM4AAjkR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 1 year ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
EPSS Percentage: 0.00054
EPSS Percentile: 0.23527
Identifiers: GHSA-8p4m-62gp-33j4, CVE-2020-2118
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-2118
- https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20(2)
- http://www.openwall.com/lists/oss-security/2020/02/12/3
- https://github.com/advisories/GHSA-8p4m-62gp-33j4
Affected Packages
maven:org.jenkins-ci.plugins:pipeline-build-step
Affected Version Ranges: < 1.0.5Fixed in: 1.0.5