diff --git a/cves/2022/CVE-2022-36883.yaml b/cves/2022/CVE-2022-36883.yaml index 042a0aa568..742cc2a0ca 100644 --- a/cves/2022/CVE-2022-36883.yaml +++ b/cves/2022/CVE-2022-36883.yaml @@ -1,8 +1,8 @@ id: CVE-2022-36883 info: name: Git Plugin up to 4.11.3 on Jenkins Build Authorization - severity: high author: c-sh0 + severity: high description: A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. reference: - https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284 @@ -14,8 +14,8 @@ info: cve-id: CVE-2022-36883 cwe-id: CWE-862 metadata: - verified: true - shodan-query: "X-Jenkins" + shodan-query: X-Jenkins + verified: "true" tags: cve,cve2022,jenkins,plugin,git requests: