Jenkins Build-Publisher Plugin Insecure HTTP Endpoint Vulnerability
CVE-2022-41230
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 21 September 2022
Summary
The Jenkins Build-Publisher Plugin prior to version 1.23 lacks adequate permission checks in its HTTP endpoint. This oversight permits users with Overall/Read permissions to access sensitive information, including the names and URLs of Jenkins servers where builds are configured for publication, along with details of builds awaiting publication to these servers. Such vulnerabilities can be exploited to compromise the integrity of the build process and expose critical server configurations.
Affected Version(s)
Jenkins Build-Publisher Plugin <= 1.22
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved