Input Step Plugin Vulnerability in Jenkins Affecting User Interaction Processing
CVE-2022-43407
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 19 October 2022
What is CVE-2022-43407?
The Input Step Plugin in Jenkins allows the specification of an ID for its 'input' step without adequate restrictions or sanitization. This flaw permits attackers who have the ability to configure Pipelines to craft Jenkins build URLs that leverage these input step IDs. Such crafted links can effectively circumvent the CSRF protections in place for target URLs within Jenkins, exposing the system to potential unauthorized actions when users interact with the compromised input steps.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Pipeline: Input Step Plugin <= 451.vf1a_a_4f405289
Jenkins Pipeline: Input Step Plugin 449.451.v9c3d42f23975
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved