logo

CVE-2022-36881 org.jenkins-ci.plugins:git-client

Package

Manager: maven
Name: org.jenkins-ci.plugins:git-client
Vulnerable Version: >=0 <3.11.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00645 pctl0.69768

Details

Jenkins Git client plugin 3.11.0 does not perform SSH host key verification Jenkins Git client plugin 3.11.0 and earlier does not perform SSH host key verification when connecting to Git repositories via SSH, enabling man-in-the-middle attacks. Git client Plugin 3.11.1 provides strategies for performing host key verification for administrators to select the one that meets their security needs. For more information see [the plugin documentation](https://github.com/jenkinsci/git-client-plugin#ssh-host-key-verification).

Metadata

Created: 2022-07-28T00:00:43Z
Modified: 2022-12-12T20:36:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-cm7j-p8hc-97vj/GHSA-cm7j-p8hc-97vj.json
CWE IDs: ["CWE-295", "CWE-322"]
Alternative ID: GHSA-cm7j-p8hc-97vj
Finding: F163
Auto approve: 1