CVE-2022-25196
Published Feb 15, 2022
Last updated a year ago
Overview
- Description
- Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.
- Source
- jenkinsci-cert@googlegroups.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 4.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-601
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:jenkins:gitlab_authentication:*:*:*:*:*:jenkins:*:*", "vulnerable": true, "matchCriteriaId": "14DEE4FC-5B60-4DC7-8BBB-76311E5E5498", "versionEndIncluding": "1.13" } ], "operator": "OR" } ] } ]