Jenkins Build-Publisher vulnerabilities

4 known vulnerabilities affecting jenkins/build-publisher.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2022-41232HIGHCVSS 8.0≤ 1.222022-09-21
CVE-2022-41232 [HIGH] CWE-352 CVE-2022-41232: A cross-site request forgery (CSRF) vulnerability in Jenkins Build-Publisher Plugin 1.22 and earlier A cross-site request forgery (CSRF) vulnerability in Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers to replace any config.xml file on the Jenkins controller file system with an empty file by providing a crafted file name to an API endpoint.
nvd
CVE-2022-41231MEDIUMCVSS 5.7≤ 1.222022-09-21
CVE-2022-41231 [MEDIUM] CWE-22 CVE-2022-41231: Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to c Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any config.xml file on the Jenkins controller file system by providing a crafted file name to an API endpoint.
nvd
CVE-2022-41230MEDIUMCVSS 4.3≤ 1.222022-09-21
CVE-2022-41230 [MEDIUM] CWE-862 CVE-2022-41230: Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpo Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers.
nvd
CVE-2017-1000387HIGHCVSS 7.8≤ 1.212018-01-26
CVE-2017-1000387 [HIGH] CWE-522 CVE-2017-1000387: Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instance Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also tr
nvd