Cross-Site Request Forgery Vulnerability in Jenkins Coverity Plugin
CVE-2022-36920
8.8HIGH
Summary
The vulnerability allows an attacker to exploit the Jenkins Coverity Plugin, specifically versions 1.11.4 and earlier, to initiate unauthorized requests to an attacker-specified URL. By leveraging user credentials stored in Jenkins, an attacker can manipulate the system into connecting to malicious sites, thereby capturing sensitive information such as user credentials. This makes it crucial for users to upgrade to a secure version of the plugin and implement appropriate security measures to prevent exploitation.
Affected Version(s)
Jenkins Coverity Plugin <= 1.11.4
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved