Your review has been sent successfully

Jenkins Alert

2543
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

13 April, 2022

● Medium

2022-4662

All

Description:

Jenkins has released a security update to address a vulnerabilities in the following products:

  • Credentials Plugin up to and including 1111.v35a_307992395
  • CVS Plugin up to and including 2.19
  • Extended Choice Parameter Plugin up to and including 346.vd87693c5a_86c
  • Gerrit Trigger Plugin up to and including 2.35.2
  • Git Parameter Plugin up to and including 0.9.15
  • Google Compute Engine Plugin up to and including 4.3.8
  • Jira Plugin up to and including 3.7
  • Job Generator Plugin up to and including 1.22
  • Mask Passwords Plugin up to and including 3.0
  • Node and Label parameter Plugin up to and including 1.10.3
  • Pipeline: Shared Groovy Libraries Plugin up to and including 564.ve62a_4eb_b_e039
  • promoted builds Plugin up to and including 873.v6149db_d64130
  • Publish Over FTP Plugin up to and including 1.16
  • Subversion Plugin up to and including 2.15.3
Threats:

Attacker could exploit this vulnerabilities by doing the following:

  • Cross-site scripting (XSS)
Best practice and Recommendations:

The CERT team encourages users to update the affected versions and to review Jenkins security advisory:

Last updated at 13 April, 2022

Rate the content

rate-icon
up icon