Jenkins Enterprise and Operations Center 2.277.x < / 2.303.x < 2.303.30.0.7 / 2.332.1.5 Multiple Vulnerabilities (CloudBees Security Advisory 2022-03-15)

high Nessus Plugin ID 161441


A job scheduling and management system hosted on the remote web server is affected by multiple vulnerabilities.


The version of Jenkins Enterprise or Jenkins Operations Center running on the remote web server is 2.277.x prior to, 2.303.x prior to 2.303.30.0.7, or 2.x prior to 2.332.1.5. It is, therefore, affected by multiple vulnerabilities, including the following:

- A cross-site request forgery (CSRF) vulnerability in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token. (CVE-2022-27198)

- Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. (CVE-2022-27201)

- A cross-site request forgery vulnerability in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers to connect to an attacker-specified URL. (CVE-2022-27204)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade Jenkins Enterprise or Jenkins Operations Center to version, 2.303.30.0.7, 2.332.1.5, or later.

See Also

Plugin Details

Severity: High

ID: 161441

File Name: cloudbees-security-advisory-2022-03-15.nasl

Version: 1.2

Type: combined

Agent: windows, macosx, unix

Family: CGI abuses

Published: 5/23/2022

Updated: 5/24/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-27204


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cloudbees:jenkins

Required KB Items: installed_sw/Jenkins

Exploit Ease: No known exploits are available

Patch Publication Date: 3/15/2022

Vulnerability Publication Date: 3/15/2022

Reference Information

CVE: CVE-2022-27195, CVE-2022-27196, CVE-2022-27197, CVE-2022-27198, CVE-2022-27199, CVE-2022-27200, CVE-2022-27201, CVE-2022-27202, CVE-2022-27203, CVE-2022-27204, CVE-2022-27205, CVE-2022-27206, CVE-2022-27207, CVE-2022-27208, CVE-2022-27209, CVE-2022-27210, CVE-2022-27211, CVE-2022-27212, CVE-2022-27213, CVE-2022-27214, CVE-2022-27215, CVE-2022-27216, CVE-2022-27217, CVE-2022-27218