First published: Wed Sep 21 2022(Updated: )
Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Build-publisher | <=1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41230 is classified as a high-severity vulnerability due to its potential for unauthorized information disclosure.
To fix CVE-2022-41230, upgrade the Jenkins Build-Publisher Plugin to version 1.23 or later.
CVE-2022-41230 affects Jenkins Build-Publisher Plugin versions up to and including 1.22.
CVE-2022-41230 is an information disclosure vulnerability due to insufficient permission checks.
Attackers with Overall/Read permission in Jenkins can exploit CVE-2022-41230 to access sensitive information.