ID |
CVE-2022-41246
|
Summary |
A missing permission check in Jenkins Worksoft Execution Manager Plugin 10.0.3.503 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.0.7:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.0.7:*:*:*:*:jenkins:*:*
-
cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.1.19:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.1.19:*:*:*:*:jenkins:*:*
-
cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.2.27:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.2.27:*:*:*:*:jenkins:*:*
-
cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.3.503:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.3.503:*:*:*:*:jenkins:*:*
|
CVSS |
Base: | None |
Impact: | |
Exploitability: | |
|
Access |
Vector | Complexity | Authentication |
|
|
|
|
Impact |
Confidentiality | Integrity | Availability |
|
|
|
|
Last major update |
25-10-2023 - 18:17 |
Published |
21-09-2022 - 16:15 |
Last modified |
25-10-2023 - 18:17 |