Incorrect Permission Assignment for Critical Resource in Jenkins Bitbucket Branch Source Plugin
Moderate severity
GitHub Reviewed
Published
Jan 13, 2022
to the GitHub Advisory Database
•
Updated Dec 27, 2023
Package
Affected versions
>= 726.v7e6f53de133c, < 746.v350d2781c184
>= 720.vbe985dd73d66, < 725.vd9f8be0fa250
>= 2.9.8, < 2.9.11.2
< 2.9.7.2
Patched versions
746.v350d2781c184
725.vd9f8be0fa250
2.9.11.2
2.9.7.2
Description
Published by the National Vulnerability Database
Jan 12, 2022
Published to the GitHub Advisory Database
Jan 13, 2022
Reviewed
Jun 20, 2022
Last updated
Dec 27, 2023
Jenkins Bitbucket Branch Source Plugin prior to 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, and 2.9.7.2 does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of credentials IDs in Bitbucket Branch Source Plugin 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, and 2.9.7.2 requires the appropriate permissions.
References