Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yNTg4LWN4NnctNnZtNs4AAtDB
Missing permission checks in Jenkins XebiaLabs XL Release Plugin allow capturing credentials
Missing permission checks in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. XebiaLabs XL Release Plugin 22.0.1 requires Overall/Administer permission for the affected form validation methods.
Permalink: https://github.com/advisories/GHSA-2588-cx6w-6vm6JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yNTg4LWN4NnctNnZtNs4AAtDB
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: 10 months ago
CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Identifiers: GHSA-2588-cx6w-6vm6, CVE-2022-34781
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-34781
- https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(2)
- https://github.com/advisories/GHSA-2588-cx6w-6vm6
Affected Packages
maven:com.xebialabs.ci:xlrelease-plugin
Versions: < 22.0.1Fixed in: 22.0.1