logo

CVE-2022-41230 org.jenkins-ci.plugins:build-publisher

Package

Manager: maven
Name: org.jenkins-ci.plugins:build-publisher
Vulnerable Version: >=0 <=1.22

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00589 pctl0.68217

Details

Missing permission check in Jenkins build-publisher Plugin Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers. At this time there is no known workaround or fix. The Build-Publisher plugin distribution has been suspended.

Metadata

Created: 2022-09-22T00:00:28Z
Modified: 2022-12-06T14:26:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-3jp6-q9cg-rvgj/GHSA-3jp6-q9cg-rvgj.json
CWE IDs: ["CWE-862", "CWE-863"]
Alternative ID: GHSA-3jp6-q9cg-rvgj
Finding: F039
Auto approve: 1