First published: Tue Feb 15 2022(Updated: )
A missing permission check in Jenkins SCP publisher Plugin 1.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Scp Publisher | <=1.8 | |
maven/org.jenkins-ci.plugins:scp | <=1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25199 is considered a medium severity vulnerability due to the potential for unauthorized SSH connections.
To fix CVE-2022-25199, upgrade the Jenkins SCP Publisher Plugin to version 1.9 or later.
CVE-2022-25199 affects users of Jenkins SCP Publisher Plugin versions 1.8 and earlier.
CVE-2022-25199 can be exploited by attackers to connect to an arbitrary SSH server using credentials of their choosing.
If upgrading is not possible, consider restricting access to users with Overall/Read permissions until a patch is applied for CVE-2022-25199.