{
  "threat_severity" : "Moderate",
  "public_date" : "2022-10-19T00:00:00Z",
  "bugzilla" : {
    "description" : "jenkins-plugin/mercurial: Webhook endpoint discloses job names to unauthorized users in Mercurial Plugin",
    "id" : "2136369",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2136369"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-200",
  "details" : [ "Jenkins Mercurial Plugin 1251.va_b_121f184902 and earlier provides information about which jobs were triggered or scheduled for polling through its webhook endpoint, including jobs the user has no permission to access.", "An information leak was found in a Jenkins plugin. This issue could allow an unauthenticated remote attacker to issue GET requests. The greatest impact is to confidentiality." ],
  "affected_release" : [ {
    "product_name" : "OCP-Tools-4.12-RHEL-8",
    "release_date" : "2023-03-06T00:00:00Z",
    "advisory" : "RHSA-2023:1064",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.12::el8",
    "package" : "jenkins-2-plugins-0:4.12.1675702407-1.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Out of support scope",
    "package_name" : "jenkins-2-plugins",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Affected",
    "package_name" : "jenkins-2-plugins",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-43410\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-43410\nhttps://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2831" ],
  "name" : "CVE-2022-43410",
  "csaw" : false
}