First published: Tue Mar 29 2022(Updated: )
A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Continuous Integration With Toad Edge | <=2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28147 is classified as a medium-severity vulnerability due to the potential for unauthorized file path enumeration.
To fix CVE-2022-28147, upgrade the Jenkins Continuous Integration with Toad Edge Plugin to version 2.4 or later.
Jenkins Continuous Integration with Toad Edge Plugin versions 2.3 and earlier are affected by CVE-2022-28147.
CVE-2022-28147 allows attackers to check for the existence of specific file paths on the Jenkins controller.
Attackers only need Overall/Read permission on Jenkins to exploit CVE-2022-28147.