Input Step Plugin Vulnerability in Jenkins Affecting User Interaction Processing
CVE-2022-43407
8.8HIGH
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 19 October 2022
What is CVE-2022-43407?
The Input Step Plugin in Jenkins allows the specification of an ID for its 'input' step without adequate restrictions or sanitization. This flaw permits attackers who have the ability to configure Pipelines to craft Jenkins build URLs that leverage these input step IDs. Such crafted links can effectively circumvent the CSRF protections in place for target URLs within Jenkins, exposing the system to potential unauthorized actions when users interact with the compromised input steps.
Affected Version(s)
Jenkins Pipeline: Input Step Plugin <= 451.vf1a_a_4f405289
Jenkins Pipeline: Input Step Plugin 449.451.v9c3d42f23975