diff --git a/cves/2022/CVE-2022-36883.yaml b/cves/2022/CVE-2022-36883.yaml index 56ea8fccfa..f14515713d 100644 --- a/cves/2022/CVE-2022-36883.yaml +++ b/cves/2022/CVE-2022-36883.yaml @@ -1,10 +1,10 @@ id: CVE-2022-36883 info: - name: Git Plugin up to 4.11.3 on Jenkins Build Authorization + name: Jenkins Git <=4.11.3 - Missing Authorization author: c-sh0 severity: high - description: A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. + description: Jenkins Git plugin through 4.11.3 contains a missing permission check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations. reference: - https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-36883 @@ -36,3 +36,5 @@ requests: - type: status status: - 200 + +# Enhanced by md on 2023/04/10