First published: Thu Jun 30 2022(Updated: )
Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier does not perform permission checks in several views and HTTP endpoints, allowing attackers with Overall/Read permission to disable jobs.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Failed Job Deactivator | <=1.2.1 | |
maven/de.einsundeins.jenkins.plugins.failedjobdeactivator:failedJobDeactivator | <=1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34818 is considered a medium severity vulnerability due to permissions flaws that allow unauthorized job deactivation.
To fix CVE-2022-34818, upgrade the Jenkins Failed Job Deactivator Plugin to version 1.2.2 or later.
Any Jenkins instance using the Failed Job Deactivator Plugin version 1.2.1 or earlier is affected by CVE-2022-34818.
The consequences of CVE-2022-34818 include the potential for attackers to disable jobs without proper authorization.
CVE-2022-34818 exploits the lack of permission checks in various views and HTTP endpoints within the Jenkins Failed Job Deactivator Plugin.