First published: Wed Jan 12 2022(Updated: )
A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:publish-over-ssh | <=1.22 | 1.24 |
Jenkins Publish Over SSH | <=1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23112 has a medium severity rating due to the potential for unauthorized remote SSH access.
To fix CVE-2022-23112, update the Jenkins Publish Over SSH Plugin to version 1.24 or later.
Jenkins Publish Over SSH Plugin versions 1.22 and earlier are affected by CVE-2022-23112.
CVE-2022-23112 is a missing permission check vulnerability that allows attackers to connect to SSH servers.
An attacker with Overall/Read access in Jenkins can exploit CVE-2022-23112 to connect to arbitrary SSH servers.