First published: Thu Jun 30 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Recipe | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34792 is a cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier that allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML.
The severity level of CVE-2022-34792 is high, with a severity value of 8.
Jenkins Recipe Plugin versions up to and including 1.2 are affected by CVE-2022-34792.
In CVE-2022-34792, the CSRF vulnerability can be exploited by attackers sending an HTTP request to an attacker-specified URL and parsing the response as XML.
Yes, a fix is available for CVE-2022-34792. It is recommended to update to a version of Jenkins Recipe Plugin that is not affected by the vulnerability.