CVE-2022-36886 – org.jenkins-ci.plugins:external-monitor-job
Package
Manager: maven
Name: org.jenkins-ci.plugins:external-monitor-job
Vulnerable Version: >=0 <192.ve979ca_8b_3ccd
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00071 pctl0.22283
Details
External Monitor Job Type Plugin does not require POST requests for an HTTP endpoint Jenkins External Monitor Job Type Plugin 191.v363d0d1efdf8 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to create runs of an external job. External Monitor Job Type Plugin 192.ve979ca_8b_3ccd requires POST requests for the affected HTTP endpoint.
Metadata
Created: 2022-07-28T00:00:43Z
Modified: 2023-10-27T20:43:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-6x63-hrxg-2hjx/GHSA-6x63-hrxg-2hjx.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-6x63-hrxg-2hjx
Finding: F007
Auto approve: 1