Jenkins Ssh vulnerabilities
4 known vulnerabilities affecting jenkins/ssh.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2022-30958HIGHCVSS 8.8≤ 2.6.12022-05-17
CVE-2022-30958 [HIGH] CWE-352 CVE-2022-30958: A cross-site request forgery (CSRF) vulnerability in Jenkins SSH Plugin 2.6.1 and earlier allows att
A cross-site request forgery (CSRF) vulnerability in Jenkins SSH Plugin 2.6.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
nvd
CVE-2022-30959MEDIUMCVSS 6.5≤ 2.6.12022-05-17
CVE-2022-30959 [MEDIUM] CWE-862 CVE-2022-30959: A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Rea
A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
nvd
CVE-2022-30957MEDIUMCVSS 4.3≤ 2.6.12022-05-17
CVE-2022-30957 [MEDIUM] CWE-862 CVE-2022-30957: A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Rea
A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
nvd
CVE-2017-1000245CRITICALCVSS 9.8≤ 2.42017-11-01
CVE-2017-1000245 [CRITICAL] CWE-522 CVE-2017-1000245: The SSH Plugin stores credentials which allow jobs to access remote servers via the SSH protocol. Us
The SSH Plugin stores credentials which allow jobs to access remote servers via the SSH protocol. User passwords and passphrases for encrypted SSH keys are stored in plaintext in a configuration file.
nvd