CVE-2022-20613

Severity
4.3MEDIUM
EPSS
0.2%
top 60.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 12
Latest updateApr 15

Description

A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

Mavenorg.jenkins-ci.plugins:mailer391.ve4a38c1bcf4b408.vd726a+1
CVEListV5jenkins_project/jenkins_mailer_pluginunspecified391.ve4a_38c1b_cf4b_
NVDjenkins/mailer< 1.34.2+1

Patches

🔴Vulnerability Details

3
OSV
Cross-Site Request Forgery in Jenkins Mailer Plugin2022-01-13
GHSA
Cross-Site Request Forgery in Jenkins Mailer Plugin2022-01-13
CVEList
CVE-2022-20613: A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 3912022-01-12

📋Vendor Advisories

3
Oracle
Oracle Oracle Communications Risk Matrix: Automated Test Suite (Jenkins Mailer) — CVE-2022-206132022-04-15
Jenkins
Jenkins Security Advisory 2022-01-122022-01-12
Red Hat
jenkins-2-plugins/mailer: form validation method does not require POST requests which could lead to CSRF2022-01-12