Cross-Site Request Forgery Vulnerability in Jenkins Storable Configs Plugin
CVE-2022-30972
8.8HIGH
Summary
The Jenkins Storable Configs Plugin prior to version 1.1 is susceptible to a cross-site request forgery (CSRF) vulnerability. This weakness enables attackers to exploit the plugin's handling of local XML files, specifically allowing for unauthorized parsing of these files. By leveraging external entities within the XML, an attacker can extract sensitive information from the Jenkins controller or perform unauthorized server-side requests. As a result, this vulnerability poses a threat to the confidentiality and integrity of data managed by Jenkins.
Affected Version(s)
Jenkins Storable Configs Plugin <= 1.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved