
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site request forgery (CSRF) vulnerability was identified in Jenkins Blue Ocean Plugin version 1.25.3 and earlier, tracked as CVE-2022-30953. The vulnerability was discovered by Tanner Emek from Tinder Security Labs and was publicly disclosed on May 17, 2022. This security issue affects the Blue Ocean Plugin, a key component of the Jenkins continuous integration and delivery platform (Jenkins Advisory).
The vulnerability stems from the Blue Ocean Plugin's failure to perform permission checks in several HTTP endpoints and not requiring POST requests. The severity of this vulnerability is rated as Medium according to the CVSS scoring system. The technical issue involves endpoints that allow HTTP requests without proper authentication controls, enabling potential CSRF attacks (Jenkins Advisory).
This vulnerability allows attackers with Overall/Read permission to send requests to an attacker-specified URL. The combination of missing permission checks and lack of POST request requirements creates a security gap that could be exploited through cross-site request forgery attacks (Jenkins Advisory).
The vulnerability has been fixed in Blue Ocean Plugin version 1.25.4. The updated version implements proper permission checks and requires POST requests for the affected HTTP endpoints. Users are advised to upgrade to this version to mitigate the security risk (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."