Vulnerability Details CVE-2022-36921
A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 59.5%
CVSS Severity
CVSS v3 Score 8.1
Products affected by CVE-2022-36921
-
cpe:2.3:a:jenkins:coverity:1.0
-
cpe:2.3:a:jenkins:coverity:1.1
-
cpe:2.3:a:jenkins:coverity:1.1.1
-
cpe:2.3:a:jenkins:coverity:1.1.2
-
cpe:2.3:a:jenkins:coverity:1.1.3
-
cpe:2.3:a:jenkins:coverity:1.1.4
-
cpe:2.3:a:jenkins:coverity:1.1.5
-
cpe:2.3:a:jenkins:coverity:1.10.0
-
cpe:2.3:a:jenkins:coverity:1.11.0
-
cpe:2.3:a:jenkins:coverity:1.11.1
-
cpe:2.3:a:jenkins:coverity:1.11.2
-
cpe:2.3:a:jenkins:coverity:1.11.3
-
cpe:2.3:a:jenkins:coverity:1.11.4
-
cpe:2.3:a:jenkins:coverity:1.2.0
-
cpe:2.3:a:jenkins:coverity:1.2.1
-
cpe:2.3:a:jenkins:coverity:1.2.2
-
cpe:2.3:a:jenkins:coverity:1.2.3
-
cpe:2.3:a:jenkins:coverity:1.2.4
-
cpe:2.3:a:jenkins:coverity:1.2.5
-
cpe:2.3:a:jenkins:coverity:1.3.0
-
cpe:2.3:a:jenkins:coverity:1.3.0.1
-
cpe:2.3:a:jenkins:coverity:1.3.1
-
cpe:2.3:a:jenkins:coverity:1.4.0
-
cpe:2.3:a:jenkins:coverity:1.4.1
-
cpe:2.3:a:jenkins:coverity:1.5.0
-
cpe:2.3:a:jenkins:coverity:1.5.1
-
cpe:2.3:a:jenkins:coverity:1.5.2
-
cpe:2.3:a:jenkins:coverity:1.6.0
-
cpe:2.3:a:jenkins:coverity:1.7.0
-
cpe:2.3:a:jenkins:coverity:1.7.1
-
cpe:2.3:a:jenkins:coverity:1.7.2
-
cpe:2.3:a:jenkins:coverity:1.7.3
-
cpe:2.3:a:jenkins:coverity:1.8.0
-
cpe:2.3:a:jenkins:coverity:1.8.1
-
cpe:2.3:a:jenkins:coverity:1.9.0
-
cpe:2.3:a:jenkins:coverity:1.9.1
-
cpe:2.3:a:jenkins:coverity:1.9.2