Lucene search

K

5 matches found

CVE
CVE
added 2022/07/27 3:15 p.m.343 views

CVE-2022-36883

A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

7.5CVSS7.3AI score0.69381EPSS
CVE
CVE
added 2022/07/27 3:15 p.m.112 views

CVE-2022-36882

A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 4.11.3 and earlier allows attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

8.8CVSS8.4AI score0.00398EPSS
CVE
CVE
added 2022/07/27 3:15 p.m.111 views

CVE-2022-36884

The webhook endpoint in Jenkins Git Plugin 4.11.3 and earlier provide unauthenticated attackers information about the existence of jobs configured to use an attacker-specified Git repository.

5.3CVSS5.3AI score0.00458EPSS
CVE
CVE
added 2022/08/23 5:15 p.m.102 views

CVE-2022-38663

Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (gitUsernamePassword) credentials binding.

6.5CVSS6.3AI score0.02053EPSS
CVE
CVE
added 2022/05/17 3:15 p.m.96 views

CVE-2022-30947

Jenkins Git Plugin 4.11.1 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

7.5CVSS7.3AI score0.01568EPSS