Enhancement: cves/2022/CVE-2022-36883.yaml by md
parent
f29da7e04f
commit
641d07d6a5
|
@ -1,10 +1,10 @@
|
|||
id: CVE-2022-36883
|
||||
|
||||
info:
|
||||
name: Git Plugin up to 4.11.3 on Jenkins Build Authorization
|
||||
name: Jenkins Git <=4.11.3 - Missing Authorization
|
||||
author: c-sh0
|
||||
severity: high
|
||||
description: A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
|
||||
description: Jenkins Git plugin through 4.11.3 contains a missing permission check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.
|
||||
reference:
|
||||
- https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-36883
|
||||
|
@ -36,3 +36,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by md on 2023/04/10
|
||||
|
|
Loading…
Reference in New Issue