Total vulnerabilities in the database
A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Software | From | Fixed in |
---|---|---|
jenkins / ssh | - | 2.6.1.x |
![]() |
- | 2.6.1.x |