Skip to main content

CVE-2022-43413: Vulnerability in Jenkins project Jenkins Job Import Plugin

Medium
VulnerabilityCVE-2022-43413cvecve-2022-43413
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Jenkins project
Product: Jenkins Job Import Plugin

Description

Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:11:32 UTC

Technical Analysis

CVE-2022-43413 is a medium-severity vulnerability affecting the Jenkins Job Import Plugin version 3.5 and earlier. The vulnerability arises because the plugin fails to perform proper permission checks on a specific HTTP endpoint. This flaw allows any authenticated user with Overall/Read permission in Jenkins to enumerate credential IDs stored within the Jenkins instance. The vulnerability is classified under CWE-862, which relates to improper authorization. Specifically, an attacker who has read-level access—which is commonly granted to many Jenkins users—can leverage this endpoint to list credential identifiers without requiring higher privileges or user interaction. Although the vulnerability does not allow direct access to credential secrets or modification of data, the exposure of credential IDs can facilitate further targeted attacks, such as credential enumeration or phishing attempts to escalate privileges or compromise CI/CD pipelines. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low complexity, privileges at the read level, no user interaction, and impacts confidentiality to a limited extent without affecting integrity or availability.

Potential Impact

For European organizations relying on Jenkins for continuous integration and deployment, this vulnerability poses a risk primarily to the confidentiality of stored credential identifiers. While the vulnerability does not directly disclose credential secrets, enumerating credential IDs can aid attackers in reconnaissance and subsequent targeted attacks, potentially leading to credential misuse or lateral movement within development and production environments. Given the widespread use of Jenkins in software development across Europe, especially in technology, finance, and manufacturing sectors, exploitation could undermine trust in automated build and deployment processes. This could result in intellectual property exposure, disruption of software delivery pipelines, and compliance issues, particularly under GDPR if personal data or sensitive information is involved in the compromised pipelines. The vulnerability's requirement for Overall/Read permission means that insider threats or compromised low-privilege accounts could exploit this flaw, increasing risk in environments with insufficient access controls or monitoring.

Mitigation Recommendations

European organizations should immediately audit their Jenkins instances to identify usage of the Jenkins Job Import Plugin version 3.5 or earlier. Although no official patch links are provided, organizations should upgrade to the latest plugin version where this vulnerability is addressed or apply any vendor-recommended fixes once available. In the interim, restrict Overall/Read permissions to trusted users only, minimizing the number of users who can access Jenkins with such privileges. Implement strict role-based access control (RBAC) policies and regularly review user permissions. Additionally, enable detailed logging and monitoring of Jenkins HTTP endpoints to detect unusual enumeration activities. Network-level controls such as firewall rules or web application firewalls (WAFs) can be configured to limit access to Jenkins management interfaces to trusted IP ranges. Finally, educate development and DevOps teams about the risks of credential exposure and enforce credential rotation policies to reduce the impact of any potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-10-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd8020

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:11:32 AM

Last updated: 8/2/2025, 1:01:27 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats