Rewterz Threat Advisory – CVE-2022-41622 – F5 BIG-IP and BIG-IQ Vulnerability
November 17, 2022Rewterz Threat Advisory – CVE-2022-45395 – Jenkins CCCC Plugin Vulnerability
November 17, 2022Rewterz Threat Advisory – CVE-2022-41622 – F5 BIG-IP and BIG-IQ Vulnerability
November 17, 2022Rewterz Threat Advisory – CVE-2022-45395 – Jenkins CCCC Plugin Vulnerability
November 17, 2022Severity
Medium
Analysis Summary
CVE-2022-45398 CVSS:4.3
Jenkins Cluster Statistics Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to delete recorded Jenkins Cluster Statistics. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2022-45399 CVSS:4.3
Jenkins Cluster Statistics Plugin could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission validation. By sending a specially-crafted request, an attacker could exploit this vulnerability to delete recorded Jenkins Cluster Statistics.
Impact
- Gain Access
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2022-45398
- CVE-2022-45399
Affected Vendors
Jenkins
Affected Products
- Jenkins Cluster Statistics Plugin 0.4.6
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.