Vulnerability Details : CVE-2022-25196
Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.
Vulnerability category: Open redirect
Products affected by CVE-2022-25196
- cpe:2.3:a:jenkins:gitlab_authentication:*:*:*:*:*:jenkins:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-25196
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-25196
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:N |
6.8
|
4.9
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2022-25196
-
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.Assigned by:
- jenkinsci-cert@googlegroups.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2022-25196
-
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833
Jenkins Security Advisory 2022-02-15Issue Tracking;Patch;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2022/02/15/2
oss-security - Multiple vulnerabilities in Jenkins pluginsMailing List;Third Party Advisory
Jump to