A cross-site request forgery (CSRF) vulnerability in Jenkins Proxmox Plugin 0.7.0 and earlier allows attackers to connect to an attacker-specified host using attacker-specified username and password (perform a connection test), disable SSL/TLS validation for the entire Jenkins controller JVM as part of the connection test (see CVE-2022-28142), and test a rollback with attacker-specified parameters.
[
{
"product": "Jenkins Proxmox Plugin",
"vendor": "Jenkins project",
"versions": [
{
"lessThanOrEqual": "0.7.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]