Skip to main content

CVE-2022-41230: Vulnerability in Jenkins project Jenkins Build-Publisher Plugin

Medium
VulnerabilityCVE-2022-41230cvecve-2022-41230
Published: Wed Sep 21 2022 (09/21/2022, 15:45:51 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins project
Product: Jenkins Build-Publisher Plugin

Description

Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers.

AI-Powered Analysis

AILast updated: 07/07/2025, 08:56:26 UTC

Technical Analysis

CVE-2022-41230 is a medium-severity vulnerability affecting the Jenkins Build-Publisher Plugin version 1.22 and earlier. The vulnerability arises because the plugin fails to perform proper permission checks on a specific HTTP endpoint. This flaw allows attackers who already possess Overall/Read permission on the Jenkins instance to access sensitive information that should be restricted. Specifically, such attackers can retrieve the names and URLs of Jenkins servers configured as targets for build publication, as well as details about builds pending publication to those servers. The vulnerability is classified under CWE-862 (Missing Authorization) and does not require user interaction. Exploitation can be performed remotely over the network (AV:N), with low attack complexity (AC:L), and requires the attacker to have at least read-level privileges (PR:L). The impact is limited to confidentiality as no integrity or availability impact is reported. No known exploits are currently in the wild, and no patches are explicitly linked in the provided data, though it is expected that newer plugin versions address this issue. The vulnerability could facilitate reconnaissance activities by malicious insiders or attackers who have gained limited access, potentially aiding further attacks by revealing infrastructure details.

Potential Impact

For European organizations using Jenkins with the Build-Publisher Plugin, this vulnerability could lead to unauthorized disclosure of internal CI/CD infrastructure details. While the attacker must already have read-level access, which is a moderate barrier, the exposure of Jenkins server URLs and pending build information could assist in planning more targeted attacks, such as lateral movement or supply chain compromises. Organizations handling sensitive or critical software development pipelines could face increased risk of intellectual property exposure or disruption if attackers leverage this information. The confidentiality breach might also contravene European data protection regulations if the disclosed information includes or leads to exposure of personal or sensitive data. However, since the vulnerability does not allow modification or disruption of builds, the immediate operational impact is limited. Still, the information leakage can be a stepping stone for more severe attacks, especially in environments with complex Jenkins deployments.

Mitigation Recommendations

European organizations should immediately audit their Jenkins instances to identify usage of the Build-Publisher Plugin version 1.22 or earlier. Upgrading to the latest plugin version that includes proper permission checks is the primary mitigation step. If an upgrade is not immediately feasible, organizations should restrict Overall/Read permissions to trusted users only, minimizing the risk of unauthorized information disclosure. Additionally, network-level controls such as firewall rules or VPN requirements should be enforced to limit access to Jenkins servers. Implementing monitoring and alerting on unusual access patterns to the affected HTTP endpoint can help detect exploitation attempts. Organizations should also review their Jenkins security configurations to ensure the principle of least privilege is enforced across all users and plugins. Finally, documenting and regularly reviewing plugin permissions and access control policies will reduce the risk of similar vulnerabilities being exploited.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-09-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68372487182aa0cae2510594

Added to database: 5/28/2025, 2:58:15 PM

Last enriched: 7/7/2025, 8:56:26 AM

Last updated: 7/26/2025, 3:49:07 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats