Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-43407

EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-43407

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jenkins Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the 'input' step, which is used for the URLs that process user interactions for the given 'input' step (proceed or abort) and is not correctly encoded, allowing attackers able to configure Pipelines to have Jenkins build URLs from 'input' step IDs that would bypass the CSRF protection of any target URL in Jenkins when the 'input' step is interacted with.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Jenkins Plugin Pipeline:Input Step 跨站请求伪造漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Jenkins和Jenkins Plugin都是Jenkins开源的产品。Jenkins是一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。Jenkins Plugin是一个应用软件。 Jenkins Plugin Pipeline:Input Step 451.vf1a_a_4f405289及之前版本存在安全漏洞,该漏洞源于不会限制或清理“输入”步骤的可选指定 ID,攻击者利用该漏洞可以配置管道让 Jenkins 从“输入”步骤 ID 构建 URL,当与“
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Jenkins projectJenkins Pipeline: Input Step Plugin 449.451.v9c3d42f23975 -

II. Public POCs for CVE-2022-43407

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-43407

登录查看更多情报信息。

Same Patch Batch · Jenkins project · 2022-10-19 · 35 CVEs total

CVE-2022-43428Jenkins Compuware Topaz for Total Test Plugin 安全漏洞
CVE-2022-43420Jenkins Contrast Continuous Application Security Plugin 跨站脚本漏洞
CVE-2022-43421Jenkins Tuleap Git Branch Source Plugin 安全漏洞
CVE-2022-43422Jenkins Compuware Topaz Utilities Plugin 安全漏洞
CVE-2022-43423Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 安全漏洞
CVE-2022-43424Jenkins Compuware Xpediter Code Coverage Plugin 安全漏洞
CVE-2022-43425Jenkins Custom Checkbox Parameter Plugin 跨站脚本漏洞
CVE-2022-43426Jenkins S3 Explorer Plugin 安全漏洞
CVE-2022-43427Jenkins Compuware Topaz for Total Test Plugin 安全漏洞
CVE-2022-43419Jenkins Katalon Plugin 安全漏洞
CVE-2022-43429Jenkins Compuware Topaz for Total Test Plugin 安全漏洞
CVE-2022-43430Jenkins Compuware Topaz for Total Test Plugin 代码问题漏洞
CVE-2022-43431Jenkins Compuware Strobe Measurement Plugin 安全漏洞
CVE-2022-43432Jenkins XFramium Builder Plugin 安全漏洞
CVE-2022-43433Jenkins ScreenRecorder Plugin 安全漏洞
CVE-2022-43434Jenkins NeuVector Vulnerability Scanner Plugin 安全漏洞
CVE-2022-43435Jenkins 360 FireLine Plugin 安全漏洞
CVE-2022-43411Jenkins Plugin GitLab 安全漏洞
CVE-2022-43402Jenkins Plugin Pipeline: Groovy 安全漏洞
CVE-2022-43403Jenkins Plugin Script Security 安全漏洞

Showing top 20 of 35 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-43407

No comments yet


Leave a comment