First published: Tue Nov 15 2022(Updated: )
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.146 and earlier unconditionally disables SSL/TLS certificate and hostname validation for several features.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ns-nd Integration Performance Publisher | <=4.8.0.146 | |
maven/org.jenkins-ci.main:cavisson-ns-nd-integration | <=4.8.0.146 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38666 is classified as a high-severity vulnerability due to the unvalidated SSL/TLS certificate and hostname validations.
To fix CVE-2022-38666, upgrade the Jenkins NS-ND Integration Performance Publisher Plugin to version 4.8.0.147 or later.
The risks associated with CVE-2022-38666 include potential man-in-the-middle attacks resulting from the lack of SSL/TLS validation.
CVE-2022-38666 affects Jenkins NS-ND Integration Performance Publisher Plugin versions 4.8.0.146 and earlier.
CVE-2022-38666 impacts several features of the Jenkins NS-ND Integration Performance Publisher Plugin that rely on SSL/TLS connections.