Lucene search

K
cve[email protected]CVE-2022-36883
HistoryJul 27, 2022 - 3:15 p.m.

CVE-2022-36883

2022-07-2715:15:08
CWE-862
web.nvd.nist.gov
244
4
cve-2022-36883
jenkins
git plugin
permission check
unauthenticated attackers
build trigger
security vulnerability
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

High

0.012 Low

EPSS

Percentile

84.9%

A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

Affected configurations

NVD
Node
jenkinsgitRange4.11.3jenkins
CPENameOperatorVersion
jenkins:gitjenkins gitle4.11.3

CNA Affected

[
  {
    "product": "Jenkins Git Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "lessThanOrEqual": "4.11.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "4.9.3"
      }
    ]
  }
]

Social References

More

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

High

0.012 Low

EPSS

Percentile

84.9%