An incorrect permission check in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers with Generic Create permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-1982 | vendor advisory |
http://www.openwall.com/lists/oss-security/2021/06/10/14 | third party advisory mailing list |