-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:azure-vm-agents | maven | <= 0.8.0 | 0.8.1 |
The vulnerability stems from the doFillAzureCredentialsIdItems method in AzureVMCloud.java, which was modified in the security patch to add permission checks (Jenkins.ADMINISTER and EXTENDED_READ/USE_ITEM). The pre-patch version used CredentialsProvider.lookupCredentials with SYSTEM ACL, implicitly trusting the UI interaction without verifying the user's actual permissions. This allowed low-privileged users to access credential metadata through form validation endpoints.
A Semantic Attack on Google Gemini - Read the Latest Research