Rapid7 Vulnerability & Exploit Database

Jenkins Advisory 2022-06-22: CVE-2022-34180: Improper authorization in Embeddable Build Status Plugin bypasses ViewStatus permission requirement

Back to Search

Jenkins Advisory 2022-06-22: CVE-2022-34180: Improper authorization in Embeddable Build Status Plugin bypasses ViewStatus permission requirement

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
06/23/2022
Created
07/16/2022
Added
07/12/2022
Modified
07/15/2022

Description

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.

Solution(s)

  • jenkins-lts-upgrade-2_332_4
  • jenkins-upgrade-2_356

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;