-
CVSS Score
-The vulnerability stems from missing permission checks in HTTP endpoints handling credential operations. Jenkins plugins typically implement credential selection through descriptor methods like doFillItems and doCheck for form validation. These methods are common attack vectors for credential enumeration when lacking authorization checks. The pattern matches other credential-related vulnerabilities in Jenkins plugins where descriptor methods fail to validate user permissions before exposing credential metadata.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:coverity | maven | <= 1.11.4 |