XPath Configuration Viewer Plugin Vulnerability in Jenkins
CVE-2022-34813
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 30 June 2022
Summary
The Jenkins XPath Configuration Viewer Plugin suffers from a vulnerability which allows users with Overall/Read permissions to create and delete XPath expressions without proper authorization. This flaw can lead to unauthorized modifications of sensitive configurations, posing a risk to the integrity of the Jenkins environment. Users are urged to evaluate their use of the affected plugin and apply any necessary updates to mitigate this risk.
Affected Version(s)
Jenkins XPath Configuration Viewer Plugin <= 1.1.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved