
Cloud Vulnerability DB
A community-led vulnerabilities database
A missing permission check vulnerability was identified in Jenkins Publish Over SSH Plugin versions 1.22 and earlier, tracked as CVE-2022-23112. The vulnerability was disclosed on January 12, 2022, affecting the Jenkins Publish Over SSH Plugin, which is used for SSH-based file transfers and command execution in Jenkins environments (Jenkins Advisory).
The vulnerability stems from the plugin's failure to perform adequate permission checks in methods implementing connection tests. The severity of this vulnerability is rated as Medium according to CVSS scoring system. This security flaw specifically affects the connection test functionality within the plugin (Jenkins Advisory).
The vulnerability allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials. This could potentially lead to unauthorized access and credential exposure (NVD).
As of the advisory publication date, no official fix was available for this vulnerability in the Publish Over SSH Plugin. Users are advised to assess their risk and implement additional security controls to restrict access to the affected functionality (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."