First published: Tue Mar 15 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=189.v3551d5642995 | ||
>=1.28<1.28.2 | ||
=1.32 | ||
maven/org.jenkins-ci.plugins:aws-credentials | <=189.v3551d5642995 | |
Jenkins Cloudbees Aws Credentials | <=189.v3551d5642995 | |
Jenkins Cloudbees Aws Credentials | >=1.28<1.28.2 | |
Jenkins Cloudbees Aws Credentials | =1.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27198 is classified as a high severity vulnerability due to its potential for unauthenticated access to AWS services.
To fix CVE-2022-27198, upgrade the CloudBees AWS Credentials Plugin to version 1.32 or later.
CVE-2022-27198 affects users of the Jenkins CloudBees AWS Credentials Plugin versions prior to 1.32.
CVE-2022-27198 is a cross-site request forgery (CSRF) vulnerability that allows attackers to manipulate AWS service connections.
Exploitation of CVE-2022-27198 requires overall read permissions within Jenkins.