Enhancement: cves/2022/CVE-2022-36883.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-04-10 13:58:46 -04:00
parent f29da7e04f
commit 641d07d6a5
1 changed files with 4 additions and 2 deletions

View File

@ -1,10 +1,10 @@
id: CVE-2022-36883
info:
name: Git Plugin up to 4.11.3 on Jenkins Build Authorization
name: Jenkins Git <=4.11.3 - Missing Authorization
author: c-sh0
severity: high
description: A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
description: Jenkins Git plugin through 4.11.3 contains a missing permission check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-36883
@ -36,3 +36,5 @@ requests:
- type: status
status:
- 200
# Enhanced by md on 2023/04/10