First published: Tue Feb 15 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Chef Sinatra Plugin 1.20 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse an XML response.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Chef Sinatra | <=1.20 | |
maven/org.jenkins-ci.plugins:sinatra-chef-builder | <=1.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25207 is classified as a medium severity vulnerability due to the possibility of cross-site request forgery attacks.
CVE-2022-25207 allows attackers to send unauthorized HTTP requests to an attacker-controlled URL via Jenkins Chef Sinatra Plugin versions 1.20 and earlier.
To fix CVE-2022-25207, upgrade the Jenkins Chef Sinatra Plugin to a version later than 1.20.
Users of Jenkins Chef Sinatra Plugin version 1.20 and earlier are at risk from CVE-2022-25207.
Exploitation of CVE-2022-25207 can lead to unauthorized actions being performed within Jenkins, posing security risks.