ID CVE-2022-41246
Summary A missing permission check in Jenkins Worksoft Execution Manager Plugin 10.0.3.503 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
References
Vulnerable Configurations
  • cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.0.7:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.0.7:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.1.19:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.1.19:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.2.27:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.2.27:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.3.503:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:worksoft_execution_manager:10.0.3.503:*:*:*:*:jenkins:*:*
CVSS
Base: None
Impact:
Exploitability:
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 25-10-2023 - 18:17
Published 21-09-2022 - 16:15
Last modified 25-10-2023 - 18:17
Back to Top