CVE-2022-41230 – org.jenkins-ci.plugins:build-publisher
Package
Manager: maven
Name: org.jenkins-ci.plugins:build-publisher
Vulnerable Version: >=0 <=1.22
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00589 pctl0.68217
Details
Missing permission check in Jenkins build-publisher Plugin Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers. At this time there is no known workaround or fix. The Build-Publisher plugin distribution has been suspended.
Metadata
Created: 2022-09-22T00:00:28Z
Modified: 2022-12-06T14:26:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-3jp6-q9cg-rvgj/GHSA-3jp6-q9cg-rvgj.json
CWE IDs: ["CWE-862", "CWE-863"]
Alternative ID: GHSA-3jp6-q9cg-rvgj
Finding: F039
Auto approve: 1