First published: Wed Oct 19 2022(Updated: )
An information leak was found in a Jenkins plugin. This issue could allow an unauthenticated remote attacker to issue GET requests. The greatest impact is to confidentiality.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.12.1675702407-1.el8 | 2-plugins-0:4.12.1675702407-1.el8 |
maven/org.jenkins-ci.plugins:mercurial | <1260.vdfb | 1260.vdfb_723cdcc81 |
redhat/mercurial | <1260. | 1260. |
Mercurial | <=1251.va_b_121f184902 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43410 is a critical vulnerability that impacts confidentiality due to an information leak in a Jenkins plugin.
To fix CVE-2022-43410, upgrade the Mercurial Plugin to version 1260.vdfb or later.
CVE-2022-43410 affects Jenkins with the Mercurial Plugin version 1251.va_b_121f184902 and earlier.
The main risk of CVE-2022-43410 is that an unauthenticated remote attacker could gain confidential information through the webhook endpoint.
Disabling the affected Mercurial Plugin can temporarily mitigate the risks associated with CVE-2022-43410 until a patch is applied.