
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-41227 is a Cross-Site Request Forgery (CSRF) vulnerability discovered in the NS-ND Integration Performance Publisher Plugin for Jenkins. The vulnerability was disclosed on September 21, 2022, affecting versions 4.8.0.129 and earlier of the plugin. This security issue was identified with a medium severity CVSS score (Jenkins Advisory).
The vulnerability stems from a missing permission check in a method implementing form validation, combined with the absence of POST request requirements. The technical issue is tracked as SECURITY-2737 in Jenkins security advisory system (Jenkins Advisory).
The vulnerability allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified username and password credentials. This creates a potential security risk where unauthorized users could exploit the form validation method to perform unauthorized actions (Jenkins Advisory).
The vulnerability has been fixed in NS-ND Integration Performance Publisher Plugin version 4.8.0.130. The fix implements proper POST request requirements and Overall/Administer permission checks for the affected form validation method. Users are advised to upgrade to this version to mitigate the vulnerability (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."