Loading HuntDB...

GHSA-57ww-2cvr-wv38

GitHub Security Advisory

Jenkins Job Import Plugin vulnerable to exposure of sensitive information

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Job Import Plugin did not check user permissions on its API endpoint used to access remote Jenkins instances. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Job Import Plugin 3.0 will only access Jenkins instances using credentials defined in the global configuration.

Affected Packages

Maven org.jenkins-ci.plugins:job-import-plugin
Affected versions: 0 (fixed in 3.0)

Related CVEs

Key Information

GHSA ID
GHSA-57ww-2cvr-wv38
Published
May 13, 2022 1:31 AM
Last Modified
October 25, 2023 11:04 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:job-import-plugin
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 1, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.