Authentication Redirection Vulnerability in Jenkins GitLab Plugin by Jenkins
CVE-2022-25196

5.4MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
15 February 2022

What is CVE-2022-25196?

The Jenkins GitLab Authentication Plugin versions 1.13 and earlier are vulnerable to an issue where the HTTP Referer header is recorded as part of the URL query parameters during the authentication process. This flaw enables attackers with access to Jenkins to create malicious URLs. When users log in, they may be redirected to an attacker-controlled site, potentially leading to phishing attacks or further exploitation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins GitLab Authentication Plugin <= 1.13

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.