First published: Tue Feb 15 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Swarm | <=1.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25212 has been classified with a medium severity score due to its potential impact on user data and security.
To fix CVE-2022-25212, upgrade the Jenkins SWAMP Plugin to version 1.2.7 or later.
CVE-2022-25212 affects users of the Jenkins SWAMP Plugin version 1.2.6 and earlier.
An attacker exploiting CVE-2022-25212 can initiate requests to a specified web server using credentials supplied by the victim.
CVE-2022-25212 is primarily relevant to users of the Jenkins SWAMP Plugin, which may limit its widespread impact.