Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-36883
HistoryAug 08, 2022 - 8:32 p.m.

Jenkins Git <=4.11.3 - Missing Authorization

2022-08-0820:32:02
ProjectDiscovery
github.com
4

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.4 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.012 Low

EPSS

Percentile

84.7%

Jenkins Git plugin through 4.11.3 contains a missing authorization check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.

id: CVE-2022-36883

info:
  name: Jenkins Git <=4.11.3 - Missing Authorization
  author: c-sh0
  severity: high
  description: Jenkins Git plugin through 4.11.3 contains a missing authorization check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.
  impact: |
    This vulnerability can lead to unauthorized access to sensitive data and unauthorized actions being performed on the Jenkins Git plugin.
  remediation: |
    Upgrade to a fixed version of the Jenkins Git plugin (>=4.11.4) or apply the provided patch to mitigate the vulnerability.
  reference:
    - https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-36883
    - https://nvd.nist.gov/vuln/detail/CVE-2022-36883
    - http://www.openwall.com/lists/oss-security/2022/07/27/1
    - https://github.com/StarCrossPortal/scalpel
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
    cvss-score: 7.5
    cve-id: CVE-2022-36883
    cwe-id: CWE-862
    epss-score: 0.01328
    epss-percentile: 0.84605
    cpe: cpe:2.3:a:jenkins:git:*:*:*:*:*:jenkins:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: jenkins
    product: git
    framework: jenkins
    shodan-query: X-Jenkins
  tags: cve,cve2022,jenkins,plugin,git,intrusive

http:
  - method: GET
    path:
      - "{{BaseURL}}/git/notifyCommit?url={{randstr}}&branches={{randstr}}"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "repository:"
          - SCM API plugin
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100ac3853e5c0b1575adbb7b7ed2af7b72f43f114875211dd347e0293df556a12a602201f6215244b284d054336a4750c2340219ab9d9be367383ba0b171439c19ccd56:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.4 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.012 Low

EPSS

Percentile

84.7%