Vulnerability Details CVE-2022-30959
A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.2%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.0
Products affected by CVE-2022-30959
-
cpe:2.3:a:jenkins:ssh:1.0
-
cpe:2.3:a:jenkins:ssh:1.1
-
cpe:2.3:a:jenkins:ssh:1.2
-
cpe:2.3:a:jenkins:ssh:1.3
-
cpe:2.3:a:jenkins:ssh:1.4
-
cpe:2.3:a:jenkins:ssh:1.5
-
cpe:2.3:a:jenkins:ssh:1.6
-
cpe:2.3:a:jenkins:ssh:1.7
-
cpe:2.3:a:jenkins:ssh:2.0
-
cpe:2.3:a:jenkins:ssh:2.1
-
cpe:2.3:a:jenkins:ssh:2.2
-
cpe:2.3:a:jenkins:ssh:2.3
-
cpe:2.3:a:jenkins:ssh:2.4
-
cpe:2.3:a:jenkins:ssh:2.5
-
cpe:2.3:a:jenkins:ssh:2.6
-
cpe:2.3:a:jenkins:ssh:2.6.1