CVE-2022-43413: Jenkins Job Import Plugin allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22066%
CWE
Published
10/19/2022
Updated
1/4/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:job-import-plugin | maven | <= 3.5 | 3.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows these two functions were modified to add Jenkins.get().hasPermission(JOB_IMPORT) checks in version 3.6. Prior to this fix, these HTTP endpoint handlers: 1) doFillCredentialIdItems - directly exposed credential IDs through UI controls 2) doFillJenkinsSitesItems - revealed Jenkins site configurations. Both lacked authorization checks, enabling credential ID enumeration via the plugin's web interface components.