Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/02/15/2 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833 | Issue Tracking Patch Vendor Advisory |
Configurations
History
23 Feb 2022, 19:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:gitlab_authentication:*:*:*:*:*:jenkins:*:* | |
CWE | CWE-601 | |
CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 5.4 |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/02/15/2 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833 - Issue Tracking, Patch, Vendor Advisory |
15 Feb 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Feb 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-15 17:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-25196
Mitre link : CVE-2022-25196
CVE.ORG link : CVE-2022-25196
JSON object : View
Products Affected
jenkins
- gitlab_authentication
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')