
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site request forgery (CSRF) vulnerability was discovered in Jenkins ThreadFix Plugin 1.5.4 and earlier. The vulnerability was disclosed on June 22, 2022, and assigned identifier CVE-2022-34209. This vulnerability affects the form validation functionality of the plugin and allows attackers to connect to an attacker-specified URL (Jenkins Advisory).
The vulnerability exists because the form validation method in ThreadFix Plugin does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. The severity is rated as Medium according to CVSS scoring system. The vulnerability affects all versions of ThreadFix Plugin up to and including version 1.5.4 (Jenkins Advisory).
This vulnerability allows attackers with Overall/Read permission to connect to an attacker-specified URL through CSRF attacks. This could potentially lead to unauthorized actions being performed on behalf of authenticated users (Jenkins Advisory).
As of the advisory publication date (June 22, 2022), there was no fix available for this vulnerability in the ThreadFix Plugin. Users should monitor for updates and implement general security best practices while waiting for a patch (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."