漏洞描述
A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
id: CVE-2022-36883
info:
name: Git Plugin up to 4.11.3 on Jenkins Build Authorization
author: c-sh0
severity: high
verified: true
description: A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
reference:
- https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-36883
- https://nvd.nist.gov/vuln/detail/CVE-2022-36883
tags: cve,cve2022,jenkins,git,auth-bypass
created: 2023/10/10
set:
randstr: randomLowercase(32)
rules:
r0:
request:
method: GET
path: /git/notifyCommit?url={{randstr}}&branches={{randstr}}
expression: response.status == 200 && response.body.bcontains(b'repository:') && response.body.bcontains(b'SCM API plugin')
expression: r0()