Description
An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4Attack Vector: Network
Complexity: Low
Privileges: Low
User Interaction: None
Scope: Unchanged
Confidentiality: Low
Integrity: None
Availability: None
Affected Packages3 packages
🔴Vulnerability Details
3OSVIncorrect permission check in Jenkins GitLab Plugin allows enumerating credentials IDs↗2025-01-22 ▶ CVEListCVE-2025-24397: An incorrect permission check in Jenkins GitLab Plugin 1↗2025-01-22 ▶ GHSAIncorrect permission check in Jenkins GitLab Plugin allows enumerating credentials IDs↗2025-01-22 ▶ 📋Vendor Advisories
2GitLabCVE-2025-24397: An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Co↗2025-01-22 ▶ JenkinsJenkins Security Advisory 2025-01-22↗2025-01-22 ▶