
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-41233 is a security vulnerability discovered in Jenkins Rundeck Plugin versions 3.6.11 and earlier. The vulnerability was disclosed on September 21, 2022, affecting the permission checks functionality in multiple HTTP endpoints of the plugin. This security issue specifically impacts the Jenkins Rundeck Plugin, which is used for integration between Jenkins and Rundeck (Jenkins Advisory).
The vulnerability is characterized by missing Run/Artifacts permission checks in multiple HTTP endpoints within the Rundeck Plugin. The severity is rated as Medium according to the CVSS v3.1 base score of 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). This indicates a relatively moderate risk level with network accessibility and low attack complexity (NVD).
The vulnerability allows attackers with Item/Read permission to obtain information about build artifacts of a given job when the optional Run/Artifacts permission is enabled. This unauthorized access to build artifact information could potentially expose sensitive project data (Jenkins Advisory).
As of the advisory publication date, no official fix was available for this vulnerability in the Rundeck Plugin. Users running affected versions (3.6.11 and earlier) should carefully evaluate their permission settings and consider restricting Item/Read access to trusted users only (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."