
Cloud Vulnerability DB
A community-led vulnerabilities database
The Job and Node ownership Plugin for Jenkins version 0.13.0 and earlier contains multiple security vulnerabilities identified as SECURITY-2062. The vulnerabilities include a Cross-Site Request Forgery (CSRF) vulnerability (CVE-2022-28150) and a missing permission check (CVE-2022-28151) that affect the plugin's HTTP endpoints (Jenkins Advisory).
The vulnerability allows attackers with Item/Read permission to change the owners and item-specific permissions of a job due to missing permission checks in several HTTP endpoints. Additionally, these endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. The CVSS severity is rated as Medium. The CSRF vulnerability is only exploitable in Jenkins 2.286 and earlier, LTS 2.277.1 and earlier (Jenkins Advisory).
Successful exploitation of these vulnerabilities could allow attackers to modify job ownership settings and item-specific permissions without proper authorization. This could lead to unauthorized access control changes and potential privilege escalation within affected Jenkins installations (Jenkins Advisory).
As of the advisory publication date, there is no fix available for these vulnerabilities in the Job and Node ownership Plugin. Users should consider implementing additional access controls and monitoring of job ownership changes until a patch becomes available (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."