CVE-2022-20616: Incorrect Permission Assignment for Critical Resource in Jenkins Credentials Binding Plugin
(updated )
Jenkins Credentials Binding Plugin prior to 1.27.1 and 1.24.1 does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it’s a zip file.
Credentials Binding Plugin 1.27.1 and 1.24.1 performs permission checks when validating secret file credentials IDs.
References
- github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20616.json
- github.com/advisories/GHSA-gqm2-2gcx-p88w
- github.com/jenkinsci/credentials-binding-plugin
- github.com/jenkinsci/credentials-binding-plugin/commit/2dd5eda721e52d9a5bf6748405adf965ba517d8a
- nvd.nist.gov/vuln/detail/CVE-2022-20616
- www.jenkins.io/security/advisory/2022-01-12/
Detect and mitigate CVE-2022-20616 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →