CVE-2022-36882Cross-Site Request Forgery in Project Jenkins GIT Plugin

Severity
8.8HIGHNVD
EPSS
0.3%
top 48.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 27
Latest updateAug 3

Description

A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 4.11.3 and earlier allows attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5jenkins_project/jenkins_git_pluginunspecified4.11.3
NVDjenkins/git4.11.3

🔴Vulnerability Details

3
GHSA
Lack of authentication mechanism in Jenkins Git Plugin webhook2022-07-28
OSV
Lack of authentication mechanism in Jenkins Git Plugin webhook2022-07-28
CVEList
CVE-2022-36882: A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 42022-07-27

📋Vendor Advisories

2
Red Hat
jenkins-plugin: Cross-site Request Forgery (CSRF) in org.jenkins-ci.plugins:git2022-08-03
Jenkins
Jenkins Security Advisory 2022-07-272022-07-27
CVE-2022-36882 — Cross-Site Request Forgery | cvebase