First published: Wed Sep 21 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Performance Publisher | <=4.8.0.129 | |
Jenkins Performance Publisher | <4.8.0.130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41227 has been classified as a medium severity vulnerability due to its potential to expose sensitive information.
To mitigate CVE-2022-41227, upgrade to the Jenkins NS-ND Integration Performance Publisher Plugin version 4.8.0.130 or later.
CVE-2022-41227 allows attackers to perform unauthorized actions on behalf of users, potentially leading to data breaches.
Yes, CVE-2022-41227 can be exploited via CSRF attacks, allowing attackers to send requests without user consent.
CVE-2022-41227 affects versions 4.8.0.129 and earlier of the Jenkins NS-ND Integration Performance Publisher Plugin.