CVE-2022-20612 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=2.320 <2.330 || >=0 <2.319.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00217 pctl0.44334
Details
Cross-Site Request Forgery in Jenkins Jenkins 2.329 and earlier, LTS 2.319.1 and earlier does not require POST requests for the HTTP endpoint handling manual build requests when no security realm is set, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to trigger build of job without parameters. Jenkins 2.330, LTS 2.319.2 requires POST requests for the affected HTTP endpoint.
Metadata
Created: 2022-01-21T23:37:57Z
Modified: 2023-10-27T19:01:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-p92q-7fhh-mq35/GHSA-p92q-7fhh-mq35.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-p92q-7fhh-mq35
Finding: F007
Auto approve: 1