In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Access Control Bypass vulnerabilities in an interactive lesson.
Start learningUpgrade com.qualys.plugins:qualys-cs
to version 1.6.2.7 or higher.
Affected versions of this package are vulnerable to Access Control Bypass when it does not correctly perform a permission check in multiple HTTP endpoints. This allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to do the following:
Enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
Connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.