Jenkins Rundeck Plugin 3.6.11 and earlier: /plugin/rundeck/webhook AuthZ Bypass
CVE-2022-41234 Published on September 21, 2022
Jenkins Rundeck Plugin 3.6.11 and earlier does not protect access to the /plugin/rundeck/webhook/ endpoint, allowing users with Overall/Read permission to trigger jobs that are configured to be triggerable via Rundeck.
Vulnerability Analysis
CVE-2022-41234 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is an AuthZ Vulnerability?
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
CVE-2022-41234 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2022-41234
Want to know whenever a new CVE is published for Jenkins Rundeck? stack.watch will email you.
Affected Versions
Jenkins project Jenkins Rundeck Plugin:- Version unspecified, <= 3.6.11 is affected.
- Version next of 3.6.11 and below unspecified is unknown.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.