Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zanA2LXE5Y2ctcnZnas4AAu-c
Missing permission check in Jenkins build-publisher Plugin
Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers. At this time there is no known workaround or fix. The Build-Publisher plugin distribution has been suspended.
Permalink: https://github.com/advisories/GHSA-3jp6-q9cg-rvgjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zanA2LXE5Y2ctcnZnas4AAu-c
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 9 months ago
Updated: 4 months ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-3jp6-q9cg-rvgj, CVE-2022-41230
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-41230
- https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-1994
- https://github.com/jenkins-infra/update-center2/pull/644
- https://plugins.jenkins.io/build-publisher/
- https://github.com/advisories/GHSA-3jp6-q9cg-rvgj
Affected Packages
maven:org.jenkins-ci.plugins:build-publisher
Versions: <= 1.22No known fixed version