Lucene search

K
cve[email protected]CVE-2022-41233
HistorySep 21, 2022 - 4:15 p.m.

CVE-2022-41233

2022-09-2116:15:10
CWE-862
web.nvd.nist.gov
59
2
cve-2022-41233
jenkins
rundeck plugin
security
information security
vulnerability
nvd

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.3%

Jenkins Rundeck Plugin 3.6.11 and earlier does not perform Run/Artifacts permission checks in multiple HTTP endpoints, allowing attackers with Item/Read permission to obtain information about build artifacts of a given job, if the optional Run/Artifacts permission is enabled.

Affected configurations

NVD
Node
jenkinsrundeckRange3.6.11jenkins
CPENameOperatorVersion
jenkins:rundeckjenkins rundeckle3.6.11

CNA Affected

[
  {
    "product": "Jenkins Rundeck Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "lessThanOrEqual": "3.6.11",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "unspecified",
        "status": "unknown",
        "version": "next of 3.6.11",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.3%