First published: Wed Jun 22 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins EasyQA Plugin 1.0 and earlier allows attackers to connect to an attacker-specified HTTP server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Easyqa | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34203 has been categorized with a medium severity rating due to its potential impact on the system's integrity.
To mitigate CVE-2022-34203, upgrade to a patched version of the Jenkins EasyQA Plugin that is newer than 1.0.
CVE-2022-34203 can be exploited through a cross-site request forgery (CSRF) attack allowing the attacker to interact with an HTTP server.
All versions of Jenkins EasyQA Plugin up to and including version 1.0 are vulnerable to CVE-2022-34203.
No, CVE-2022-34203 specifically affects the Jenkins EasyQA Plugin and is not dependent on the Jenkins core versions.