Skip to main content

CVE-2022-41250: Vulnerability in Jenkins project Jenkins SCM HttpClient Plugin

Medium
VulnerabilityCVE-2022-41250cvecve-2022-41250
Published: Wed Sep 21 2022 (09/21/2022, 15:46:08 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins project
Product: Jenkins SCM HttpClient Plugin

Description

A missing permission check in Jenkins SCM HttpClient Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

AI-Powered Analysis

AILast updated: 07/06/2025, 02:41:05 UTC

Technical Analysis

CVE-2022-41250 is a vulnerability identified in the Jenkins SCM HttpClient Plugin version 1.5 and earlier. The core issue is a missing permission check that allows an attacker who already has Overall/Read permission on the Jenkins instance to exploit the plugin to connect to an attacker-controlled HTTP server. By doing so, the attacker can leverage attacker-specified credentials IDs, which they must have obtained through other means, to capture credentials stored within Jenkins. This vulnerability arises from improper authorization controls (CWE-862), where the plugin fails to verify that the user has the appropriate permissions before allowing the use of stored credentials to make HTTP connections. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N). The attacker only needs low privileges (PR:L) but no UI interaction (UI:N) is required. The impact is primarily on confidentiality, as the attacker can exfiltrate sensitive credentials stored in Jenkins, but there is no direct impact on integrity or availability. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the moderate risk due to the requirement of existing read permissions and the absence of direct code execution or service disruption. No known exploits in the wild have been reported to date. The vulnerability was published on September 21, 2022, and affects Jenkins SCM HttpClient Plugin versions 1.5 and earlier, although exact affected versions are unspecified. No official patch links are provided in the data, so users should verify plugin updates from Jenkins official sources.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive credentials stored in Jenkins, a widely used automation server for continuous integration and continuous delivery (CI/CD). Many enterprises rely on Jenkins to manage build pipelines, often integrating with various source code repositories and deployment environments. If an attacker with minimal read access exploits this vulnerability, they could extract credentials that might provide further access to critical infrastructure, cloud environments, or source code repositories. This could lead to unauthorized access, intellectual property theft, or lateral movement within the network. The impact is particularly concerning for organizations with complex DevOps environments and those that store high-value credentials in Jenkins. Given the medium severity and the prerequisite of some level of access, the threat is more relevant to insiders or attackers who have already compromised low-level accounts. However, the ease of exploiting the missing permission check means that once initial access is gained, escalation to credential theft is straightforward. This could undermine trust in CI/CD pipelines and delay software delivery due to incident response activities.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately audit Jenkins SCM HttpClient Plugin versions and upgrade to the latest version where this vulnerability is patched. If no patch is available, consider disabling or removing the plugin until a fix is released. 2) Review and tighten Jenkins user permissions, ensuring that Overall/Read permissions are granted only to trusted users and service accounts. Implement the principle of least privilege rigorously. 3) Rotate all credentials stored in Jenkins that could have been exposed, especially those used in critical systems or cloud environments. 4) Enable and monitor Jenkins audit logs for unusual HTTP connections initiated by the SCM HttpClient Plugin or unexpected credential usage patterns. 5) Implement network segmentation and firewall rules to restrict Jenkins servers from making arbitrary outbound HTTP connections, limiting potential exfiltration paths. 6) Educate DevOps and security teams about this vulnerability to increase awareness and improve incident detection capabilities. 7) Regularly review and update Jenkins plugins and core to minimize exposure to known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-09-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68360472182aa0cae21ef785

Added to database: 5/27/2025, 6:29:06 PM

Last enriched: 7/6/2025, 2:41:05 AM

Last updated: 8/15/2025, 11:22:12 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats