Access Control Bypass Affecting com.qualys.plugins:qualys-cs package, versions [,1.6.2.7)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Control Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-COMQUALYSPLUGINS-5891060
  • published10 Sept 2023
  • disclosed7 Sept 2023
  • creditYaroslav Afenkin, CloudBees, Inc.

Introduced: 7 Sep 2023

CVE NOT AVAILABLE CWE-284  (opens in a new tab)

How to fix?

Upgrade com.qualys.plugins:qualys-cs to version 1.6.2.7 or higher.

Overview

Affected versions of this package are vulnerable to Access Control Bypass when it does not correctly perform a permission check in multiple HTTP endpoints. This allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to do the following:

  1. Enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.

  2. Connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVSS Base Scores

version 3.1