Cross-Site Request Forgery Vulnerability in Jenkins Storable Configs Plugin
CVE-2022-30972

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
17 May 2022

Summary

The Jenkins Storable Configs Plugin prior to version 1.1 is susceptible to a cross-site request forgery (CSRF) vulnerability. This weakness enables attackers to exploit the plugin's handling of local XML files, specifically allowing for unauthorized parsing of these files. By leveraging external entities within the XML, an attacker can extract sensitive information from the Jenkins controller or perform unauthorized server-side requests. As a result, this vulnerability poses a threat to the confidentiality and integrity of data managed by Jenkins.

Affected Version(s)

Jenkins Storable Configs Plugin <= 1.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.