CVE-2022-43413: Vulnerability in Jenkins project Jenkins Job Import Plugin
Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
AI Analysis
Technical Summary
CVE-2022-43413 is a medium-severity vulnerability affecting the Jenkins Job Import Plugin version 3.5 and earlier. The vulnerability arises because the plugin fails to perform proper permission checks on a specific HTTP endpoint. This flaw allows any authenticated user with Overall/Read permission in Jenkins to enumerate credential IDs stored within the Jenkins instance. The vulnerability is classified under CWE-862, which relates to improper authorization. Specifically, an attacker who has read-level access—which is commonly granted to many Jenkins users—can leverage this endpoint to list credential identifiers without requiring higher privileges or user interaction. Although the vulnerability does not allow direct access to credential secrets or modification of data, the exposure of credential IDs can facilitate further targeted attacks, such as credential enumeration or phishing attempts to escalate privileges or compromise CI/CD pipelines. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low complexity, privileges at the read level, no user interaction, and impacts confidentiality to a limited extent without affecting integrity or availability.
Potential Impact
For European organizations relying on Jenkins for continuous integration and deployment, this vulnerability poses a risk primarily to the confidentiality of stored credential identifiers. While the vulnerability does not directly disclose credential secrets, enumerating credential IDs can aid attackers in reconnaissance and subsequent targeted attacks, potentially leading to credential misuse or lateral movement within development and production environments. Given the widespread use of Jenkins in software development across Europe, especially in technology, finance, and manufacturing sectors, exploitation could undermine trust in automated build and deployment processes. This could result in intellectual property exposure, disruption of software delivery pipelines, and compliance issues, particularly under GDPR if personal data or sensitive information is involved in the compromised pipelines. The vulnerability's requirement for Overall/Read permission means that insider threats or compromised low-privilege accounts could exploit this flaw, increasing risk in environments with insufficient access controls or monitoring.
Mitigation Recommendations
European organizations should immediately audit their Jenkins instances to identify usage of the Jenkins Job Import Plugin version 3.5 or earlier. Although no official patch links are provided, organizations should upgrade to the latest plugin version where this vulnerability is addressed or apply any vendor-recommended fixes once available. In the interim, restrict Overall/Read permissions to trusted users only, minimizing the number of users who can access Jenkins with such privileges. Implement strict role-based access control (RBAC) policies and regularly review user permissions. Additionally, enable detailed logging and monitoring of Jenkins HTTP endpoints to detect unusual enumeration activities. Network-level controls such as firewall rules or web application firewalls (WAFs) can be configured to limit access to Jenkins management interfaces to trusted IP ranges. Finally, educate development and DevOps teams about the risks of credential exposure and enforce credential rotation policies to reduce the impact of any potential compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2022-43413: Vulnerability in Jenkins project Jenkins Job Import Plugin
Description
Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
AI-Powered Analysis
Technical Analysis
CVE-2022-43413 is a medium-severity vulnerability affecting the Jenkins Job Import Plugin version 3.5 and earlier. The vulnerability arises because the plugin fails to perform proper permission checks on a specific HTTP endpoint. This flaw allows any authenticated user with Overall/Read permission in Jenkins to enumerate credential IDs stored within the Jenkins instance. The vulnerability is classified under CWE-862, which relates to improper authorization. Specifically, an attacker who has read-level access—which is commonly granted to many Jenkins users—can leverage this endpoint to list credential identifiers without requiring higher privileges or user interaction. Although the vulnerability does not allow direct access to credential secrets or modification of data, the exposure of credential IDs can facilitate further targeted attacks, such as credential enumeration or phishing attempts to escalate privileges or compromise CI/CD pipelines. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low complexity, privileges at the read level, no user interaction, and impacts confidentiality to a limited extent without affecting integrity or availability.
Potential Impact
For European organizations relying on Jenkins for continuous integration and deployment, this vulnerability poses a risk primarily to the confidentiality of stored credential identifiers. While the vulnerability does not directly disclose credential secrets, enumerating credential IDs can aid attackers in reconnaissance and subsequent targeted attacks, potentially leading to credential misuse or lateral movement within development and production environments. Given the widespread use of Jenkins in software development across Europe, especially in technology, finance, and manufacturing sectors, exploitation could undermine trust in automated build and deployment processes. This could result in intellectual property exposure, disruption of software delivery pipelines, and compliance issues, particularly under GDPR if personal data or sensitive information is involved in the compromised pipelines. The vulnerability's requirement for Overall/Read permission means that insider threats or compromised low-privilege accounts could exploit this flaw, increasing risk in environments with insufficient access controls or monitoring.
Mitigation Recommendations
European organizations should immediately audit their Jenkins instances to identify usage of the Jenkins Job Import Plugin version 3.5 or earlier. Although no official patch links are provided, organizations should upgrade to the latest plugin version where this vulnerability is addressed or apply any vendor-recommended fixes once available. In the interim, restrict Overall/Read permissions to trusted users only, minimizing the number of users who can access Jenkins with such privileges. Implement strict role-based access control (RBAC) policies and regularly review user permissions. Additionally, enable detailed logging and monitoring of Jenkins HTTP endpoints to detect unusual enumeration activities. Network-level controls such as firewall rules or web application firewalls (WAFs) can be configured to limit access to Jenkins management interfaces to trusted IP ranges. Finally, educate development and DevOps teams about the risks of credential exposure and enforce credential rotation policies to reduce the impact of any potential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2022-10-18T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd8020
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 4:11:32 AM
Last updated: 8/2/2025, 1:01:27 AM
Views: 11
Related Threats
CVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.