CVE-2020-2310: Missing permission checks in Jenkins Ansible Plugin allow enumerating credentials IDs
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.20475%
CWE
Published
5/24/2022
Updated
12/14/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:ansible | maven | <= 1.0 | 1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from form validation methods (doFill*CredentialsIdItems) that implemented credential ID enumeration without proper permission checks. The commit patching CVE-2020-2310 adds authorization checks (item.hasPermission and Jenkins.ADMINISTER checks) to these methods across multiple files. The original vulnerable versions of these methods accepted a Project parameter without validation, while the patched versions use Item + QueryParameter with security checks. These methods directly correspond to the credential enumeration endpoints described in the vulnerability reports.