CVE-2022-20619

Severity
7.1HIGH
EPSS
0.5%
top 36.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 12
Latest updateJan 13

Description

A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:NExploitability: 2.8 | Impact: 4.2

Affected Packages3 packages

Mavenorg.jenkins-ci.plugins:cloudbees-bitbucket-branch-source726.v7e6f53de133c746.v350d2781c184+3
CVEListV5jenkins_project/jenkins_bitbucket_branch_source_pluginunspecified737.vdf9dc06105be

🔴Vulnerability Details

3
OSV
Cross-Site Request Forgery in Jenkins Bitbucket Branch Source Plugin2022-01-13
GHSA
Cross-Site Request Forgery in Jenkins Bitbucket Branch Source Plugin2022-01-13
CVEList
CVE-2022-20619: A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket Branch Source Plugin 7372022-01-12

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2022-01-122022-01-12
Red Hat
jenkins-2-plugins/cloudbees-bitbucket-branch-source: no POST request is required for an http endpoint which could allow capturing credentials stored in Jenkins2022-01-12