CVE-2022-41230: Vulnerability in Jenkins project Jenkins Build-Publisher Plugin
Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers.
AI Analysis
Technical Summary
CVE-2022-41230 is a medium-severity vulnerability affecting the Jenkins Build-Publisher Plugin version 1.22 and earlier. The vulnerability arises because the plugin fails to perform proper permission checks on a specific HTTP endpoint. This flaw allows attackers who already possess Overall/Read permission on the Jenkins instance to access sensitive information that should be restricted. Specifically, such attackers can retrieve the names and URLs of Jenkins servers configured as targets for build publication, as well as details about builds pending publication to those servers. The vulnerability is classified under CWE-862 (Missing Authorization) and does not require user interaction. Exploitation can be performed remotely over the network (AV:N), with low attack complexity (AC:L), and requires the attacker to have at least read-level privileges (PR:L). The impact is limited to confidentiality as no integrity or availability impact is reported. No known exploits are currently in the wild, and no patches are explicitly linked in the provided data, though it is expected that newer plugin versions address this issue. The vulnerability could facilitate reconnaissance activities by malicious insiders or attackers who have gained limited access, potentially aiding further attacks by revealing infrastructure details.
Potential Impact
For European organizations using Jenkins with the Build-Publisher Plugin, this vulnerability could lead to unauthorized disclosure of internal CI/CD infrastructure details. While the attacker must already have read-level access, which is a moderate barrier, the exposure of Jenkins server URLs and pending build information could assist in planning more targeted attacks, such as lateral movement or supply chain compromises. Organizations handling sensitive or critical software development pipelines could face increased risk of intellectual property exposure or disruption if attackers leverage this information. The confidentiality breach might also contravene European data protection regulations if the disclosed information includes or leads to exposure of personal or sensitive data. However, since the vulnerability does not allow modification or disruption of builds, the immediate operational impact is limited. Still, the information leakage can be a stepping stone for more severe attacks, especially in environments with complex Jenkins deployments.
Mitigation Recommendations
European organizations should immediately audit their Jenkins instances to identify usage of the Build-Publisher Plugin version 1.22 or earlier. Upgrading to the latest plugin version that includes proper permission checks is the primary mitigation step. If an upgrade is not immediately feasible, organizations should restrict Overall/Read permissions to trusted users only, minimizing the risk of unauthorized information disclosure. Additionally, network-level controls such as firewall rules or VPN requirements should be enforced to limit access to Jenkins servers. Implementing monitoring and alerting on unusual access patterns to the affected HTTP endpoint can help detect exploitation attempts. Organizations should also review their Jenkins security configurations to ensure the principle of least privilege is enforced across all users and plugins. Finally, documenting and regularly reviewing plugin permissions and access control policies will reduce the risk of similar vulnerabilities being exploited.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-41230: Vulnerability in Jenkins project Jenkins Build-Publisher Plugin
Description
Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers.
AI-Powered Analysis
Technical Analysis
CVE-2022-41230 is a medium-severity vulnerability affecting the Jenkins Build-Publisher Plugin version 1.22 and earlier. The vulnerability arises because the plugin fails to perform proper permission checks on a specific HTTP endpoint. This flaw allows attackers who already possess Overall/Read permission on the Jenkins instance to access sensitive information that should be restricted. Specifically, such attackers can retrieve the names and URLs of Jenkins servers configured as targets for build publication, as well as details about builds pending publication to those servers. The vulnerability is classified under CWE-862 (Missing Authorization) and does not require user interaction. Exploitation can be performed remotely over the network (AV:N), with low attack complexity (AC:L), and requires the attacker to have at least read-level privileges (PR:L). The impact is limited to confidentiality as no integrity or availability impact is reported. No known exploits are currently in the wild, and no patches are explicitly linked in the provided data, though it is expected that newer plugin versions address this issue. The vulnerability could facilitate reconnaissance activities by malicious insiders or attackers who have gained limited access, potentially aiding further attacks by revealing infrastructure details.
Potential Impact
For European organizations using Jenkins with the Build-Publisher Plugin, this vulnerability could lead to unauthorized disclosure of internal CI/CD infrastructure details. While the attacker must already have read-level access, which is a moderate barrier, the exposure of Jenkins server URLs and pending build information could assist in planning more targeted attacks, such as lateral movement or supply chain compromises. Organizations handling sensitive or critical software development pipelines could face increased risk of intellectual property exposure or disruption if attackers leverage this information. The confidentiality breach might also contravene European data protection regulations if the disclosed information includes or leads to exposure of personal or sensitive data. However, since the vulnerability does not allow modification or disruption of builds, the immediate operational impact is limited. Still, the information leakage can be a stepping stone for more severe attacks, especially in environments with complex Jenkins deployments.
Mitigation Recommendations
European organizations should immediately audit their Jenkins instances to identify usage of the Build-Publisher Plugin version 1.22 or earlier. Upgrading to the latest plugin version that includes proper permission checks is the primary mitigation step. If an upgrade is not immediately feasible, organizations should restrict Overall/Read permissions to trusted users only, minimizing the risk of unauthorized information disclosure. Additionally, network-level controls such as firewall rules or VPN requirements should be enforced to limit access to Jenkins servers. Implementing monitoring and alerting on unusual access patterns to the affected HTTP endpoint can help detect exploitation attempts. Organizations should also review their Jenkins security configurations to ensure the principle of least privilege is enforced across all users and plugins. Finally, documenting and regularly reviewing plugin permissions and access control policies will reduce the risk of similar vulnerabilities being exploited.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2022-09-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68372487182aa0cae2510594
Added to database: 5/28/2025, 2:58:15 PM
Last enriched: 7/7/2025, 8:56:26 AM
Last updated: 7/26/2025, 3:49:07 PM
Views: 11
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.