Lucene search

K
cveJenkinsCVE-2022-41245
HistorySep 21, 2022 - 4:15 p.m.

CVE-2022-41245

2022-09-2116:15:11
CWE-352
jenkins
web.nvd.nist.gov
41
5
cve-2022-41245
cross-site request forgery
csrf
jenkins
worksoft execution manager plugin
vulnerability
nvd

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.001

Percentile

36.3%

A cross-site request forgery (CSRF) vulnerability in Jenkins Worksoft Execution Manager Plugin 10.0.3.503 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Affected configurations

Nvd
Node
jenkinsworksoft_execution_managerRange≀10.0.3.503jenkins
VendorProductVersionCPE
jenkinsworksoft_execution_manager*cpe:2.3:a:jenkins:worksoft_execution_manager:*:*:*:*:*:jenkins:*:*

CNA Affected

[
  {
    "product": "Jenkins Worksoft Execution Manager Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "lessThanOrEqual": "10.0.3.503",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "unspecified",
        "status": "unknown",
        "version": "next of 10.0.3.503",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.001

Percentile

36.3%