First published: Tue Mar 15 2022(Updated: )
A missing permission check in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Extended Choice Parameter | <=346.vd87693c5a_86c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27205 has been assigned a medium severity rating due to its impact on Jenkins users.
To fix CVE-2022-27205, update the Jenkins Extended Choice Parameter Plugin to version 347 or later.
CVE-2022-27205 affects users of Jenkins Extended Choice Parameter Plugin versions 346.vd87693c5a_86c and earlier.
CVE-2022-27205 is a missing permission check vulnerability that allows unauthorized URL connections.
Attackers with Overall/Read permission can connect to an attacker-specified URL, which could lead to further exploitation.