First published: Wed Sep 21 2022(Updated: )
Jenkins Rundeck Plugin 3.6.11 and earlier does not perform Run/Artifacts permission checks in multiple HTTP endpoints, allowing attackers with Item/Read permission to obtain information about build artifacts of a given job, if the optional Run/Artifacts permission is enabled.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Rundeck | <=3.6.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41233 is a vulnerability in Jenkins Rundeck Plugin 3.6.11 and earlier that allows attackers with Item/Read permission to obtain information about build artifacts of a given job.
CVE-2022-41233 has a severity value of 4.3, which is considered medium.
CVE-2022-41233 allows attackers with Item/Read permission to access build artifacts of a job if the optional Run/Artifacts permission is enabled.
To fix CVE-2022-41233, it is recommended to upgrade to Jenkins Rundeck Plugin version 3.6.12 or later.
More information about CVE-2022-41233 can be found in the Jenkins Rundeck Plugin Security Advisory: https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2170