Jenkins Extended Choice Parameter Plugin Allows Unauthorized URL Connections
CVE-2022-27205

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
15 March 2022

Summary

The Jenkins Extended Choice Parameter Plugin contains a vulnerability due to a missing permission check. This flaw permits attackers with Overall/Read permission to establish connections to maliciously specified URLs. This can potentially expose sensitive information or lead to further exploitation within the Jenkins environment. It's crucial for users of the affected versions to review their plugin configurations and apply necessary security measures to mitigate risks associated with this vulnerability.

Affected Version(s)

Jenkins Extended Choice Parameter Plugin <= 346.vd87693c5a_86c

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.