First published: Wed Sep 21 2022(Updated: )
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cons3rt | <=1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41254 is rated as a high-severity vulnerability due to its potential for unauthorized credential access.
To mitigate CVE-2022-41254, upgrade the Jenkins CONS3RT Plugin to version 1.0.1 or later where the permission checks are properly implemented.
All Jenkins installations using the CONS3RT Plugin version 1.0.0 and earlier are affected by CVE-2022-41254.
CVE-2022-41254 allows attackers to connect to malicious HTTP servers and potentially capture sensitive Jenkins credentials.
If an upgrade is not feasible, restrict permissions to Overall/Read for users to mitigate the risk of CVE-2022-41254.