{ "schema_version": "1.4.0", "id": "GHSA-q9j5-2mjx-8x28", "modified": "2022-12-09T20:14:11Z", "published": "2022-09-22T00:00:26Z", "aliases": [ "CVE-2022-41250" ], "summary": "Missing permission check in Jenkins SCM HttpClient Plugin allow capturing credentials", "details": "SCM HttpClient Plugin 1.5 and earlier does not perform permission check in a method implementing form validation.\n\nThis allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.\n\nAdditionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "Maven", "name": "com.meowlomo.jenkins:scm-httpclient" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "last_affected": "1.5" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41250" }, { "type": "PACKAGE", "url": "https://github.com/jenkinsci/scm-httpclient-plugin" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2708" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/09/21/5" } ], "database_specific": { "cwe_ids": [ "CWE-862" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-09-23T12:57:46Z", "nvd_published_at": "2022-09-21T16:15:00Z" } }