4.3
CVSSv3

CVE-2022-27215

Published: 15/03/2022 Updated: 17/10/2022
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Vulnerability Summary

A missing permission check in Jenkins Release Helper Plugin 1.3.3 and previous versions allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins release helper

Github Repositories

CVE-2022-27215 A missing permission check in Jenkins Release Helper Plugin 133 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials authentication complexity vector SINGLE LOW NETWORK confidentiality integrity availability NONE PARTIAL NONE CVSS Score: 4 References https:/