First published: Wed Sep 21 2022(Updated: )
A missing permission check in Jenkins DotCi Plugin 2.40.00 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository for attacker-specified commits.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Dotci | <=2.40.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41238 is classified as a high severity vulnerability due to its potential for unauthenticated remote code execution.
To mitigate CVE-2022-41238, upgrade the Jenkins DotCi Plugin to version 2.40.01 or later, which includes the necessary permission checks.
CVE-2022-41238 allows unauthenticated attackers to trigger builds of jobs in Jenkins using attacker-specified repositories and commits.
CVE-2022-41238 affects Jenkins DotCi Plugin versions 2.40.00 and earlier.
There is no known workaround for CVE-2022-41238, so upgrading is the recommended action to secure the Jenkins instance.