Lucene search

K
cveJenkinsCVE-2022-36892
HistoryJul 27, 2022 - 3:15 p.m.

CVE-2022-36892

2022-07-2715:15:09
CWE-862
jenkins
web.nvd.nist.gov
58
4
cve-2022-36892
jenkins
rhnpush-plugin
plugin
permission bypass

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.4

Confidence

High

EPSS

0.001

Percentile

22.0%

Jenkins rhnpush-plugin Plugin 0.5.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.

Affected configurations

Nvd
Node
jenkinsrhnpush-pluginRange0.5.1jenkins
VendorProductVersionCPE
jenkinsrhnpush-plugin*cpe:2.3:a:jenkins:rhnpush-plugin:*:*:*:*:*:jenkins:*:*

CNA Affected

[
  {
    "product": "Jenkins rhnpush-plugin Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "lessThanOrEqual": "0.5.1",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.4

Confidence

High

EPSS

0.001

Percentile

22.0%

Related for CVE-2022-36892