From 500bdb56aee55003146f86fab5de9625099b084b Mon Sep 17 00:00:00 2001 From: Wadeck Follonier Date: Wed, 12 Jan 2022 15:14:07 +0100 Subject: [PATCH] Add CVEs for 2022-01-12 Jenkins advisory --- 2022/20xxx/CVE-2022-20612.json | 60 +++++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20613.json | 60 +++++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20614.json | 60 +++++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20615.json | 60 +++++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20616.json | 60 +++++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20617.json | 56 +++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20618.json | 68 +++++++++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20619.json | 68 +++++++++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20620.json | 60 +++++++++++++++++++++++++++--- 2022/20xxx/CVE-2022-20621.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23105.json | 64 +++++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23106.json | 68 +++++++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23107.json | 68 +++++++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23108.json | 56 +++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23109.json | 56 +++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23110.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23111.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23112.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23113.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23114.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23115.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23116.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23117.json | 60 +++++++++++++++++++++++++++--- 2022/23xxx/CVE-2022-23118.json | 60 +++++++++++++++++++++++++++--- 24 files changed, 1320 insertions(+), 144 deletions(-) diff --git a/2022/20xxx/CVE-2022-20612.json b/2022/20xxx/CVE-2022-20612.json index 2b1fa61e59d..e148102a732 100644 --- a/2022/20xxx/CVE-2022-20612.json +++ b/2022/20xxx/CVE-2022-20612.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20612", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins", + "version": { + "version_data": [ + { + "version_value": "2.329", + "version_affected": "<=" + }, + { + "version_value": "LTS 2.319.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2558", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2558", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20613.json b/2022/20xxx/CVE-2022-20613.json index 2bef395f51c..7a449b15ba4 100644 --- a/2022/20xxx/CVE-2022-20613.json +++ b/2022/20xxx/CVE-2022-20613.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20613", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Mailer Plugin", + "version": { + "version_data": [ + { + "version_value": "391.ve4a_38c1b_cf4b_", + "version_affected": "<=" + }, + { + "version_value": "1.34.2", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2163", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2163", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20614.json b/2022/20xxx/CVE-2022-20614.json index f77b9bb6ac1..f5da7d4aa53 100644 --- a/2022/20xxx/CVE-2022-20614.json +++ b/2022/20xxx/CVE-2022-20614.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20614", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Mailer Plugin", + "version": { + "version_data": [ + { + "version_value": "391.ve4a_38c1b_cf4b_", + "version_affected": "<=" + }, + { + "version_value": "1.34.2", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862: Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2163", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2163", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20615.json b/2022/20xxx/CVE-2022-20615.json index a98cb00f295..056cc0a2b47 100644 --- a/2022/20xxx/CVE-2022-20615.json +++ b/2022/20xxx/CVE-2022-20615.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20615", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Matrix Project Plugin", + "version": { + "version_data": [ + { + "version_value": "1.19", + "version_affected": "<=" + }, + { + "version_value": "1.18.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2017", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2017", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20616.json b/2022/20xxx/CVE-2022-20616.json index ae26a631e85..bc63541cc92 100644 --- a/2022/20xxx/CVE-2022-20616.json +++ b/2022/20xxx/CVE-2022-20616.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20616", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Credentials Binding Plugin", + "version": { + "version_data": [ + { + "version_value": "1.27", + "version_affected": "<=" + }, + { + "version_value": "1.24.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862: Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2342", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2342", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20617.json b/2022/20xxx/CVE-2022-20617.json index 4168aff3c3d..b1ea4aa7a81 100644 --- a/2022/20xxx/CVE-2022-20617.json +++ b/2022/20xxx/CVE-2022-20617.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20617", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Docker Commons Plugin", + "version": { + "version_data": [ + { + "version_value": "1.17", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1878", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1878", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20618.json b/2022/20xxx/CVE-2022-20618.json index c034ac01724..ad00d9f05a5 100644 --- a/2022/20xxx/CVE-2022-20618.json +++ b/2022/20xxx/CVE-2022-20618.json @@ -1,17 +1,73 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20618", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Bitbucket Branch Source Plugin", + "version": { + "version_data": [ + { + "version_value": "737.vdf9dc06105be", + "version_affected": "<=" + }, + { + "version_value": "725.vd9f8be0fa250", + "version_affected": "!" + }, + { + "version_value": "2.9.11.2", + "version_affected": "!" + }, + { + "version_value": "2.9.7.2", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862: Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2033", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2033", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20619.json b/2022/20xxx/CVE-2022-20619.json index f0329595e6f..750b3ea409f 100644 --- a/2022/20xxx/CVE-2022-20619.json +++ b/2022/20xxx/CVE-2022-20619.json @@ -1,17 +1,73 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20619", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Bitbucket Branch Source Plugin", + "version": { + "version_data": [ + { + "version_value": "737.vdf9dc06105be", + "version_affected": "<=" + }, + { + "version_value": "725.vd9f8be0fa250", + "version_affected": "!" + }, + { + "version_value": "2.9.11.2", + "version_affected": "!" + }, + { + "version_value": "2.9.7.2", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2467", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2467", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20620.json b/2022/20xxx/CVE-2022-20620.json index 6b1dd18078b..f8916c5aa42 100644 --- a/2022/20xxx/CVE-2022-20620.json +++ b/2022/20xxx/CVE-2022-20620.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20620", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins SSH Agent Plugin", + "version": { + "version_data": [ + { + "version_value": "1.23", + "version_affected": "<=" + }, + { + "version_value": "1.22.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Missing permission checks in Jenkins SSH Agent Plugin 1.23 and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862: Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2189", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2189", + "refsource": "CONFIRM" } ] } diff --git a/2022/20xxx/CVE-2022-20621.json b/2022/20xxx/CVE-2022-20621.json index 337ed9512c1..549ee4adb66 100644 --- a/2022/20xxx/CVE-2022-20621.json +++ b/2022/20xxx/CVE-2022-20621.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-20621", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Metrics Plugin", + "version": { + "version_data": [ + { + "version_value": "4.0.2.8", + "version_affected": "<=" + }, + { + "version_value": "4.0.2.7.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-256: Plaintext Storage of a Password" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1624", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1624", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23105.json b/2022/23xxx/CVE-2022-23105.json index 331753f1e75..544a0cb978c 100644 --- a/2022/23xxx/CVE-2022-23105.json +++ b/2022/23xxx/CVE-2022-23105.json @@ -1,17 +1,69 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23105", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Active Directory Plugin", + "version": { + "version_data": [ + { + "version_value": "2.25", + "version_affected": "<=" + }, + { + "version_value": "2.23.1", + "version_affected": "!" + }, + { + "version_value": "2.24.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319: Cleartext Transmission of Sensitive Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1389", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1389", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23106.json b/2022/23xxx/CVE-2022-23106.json index 0cd02ad3529..0a017bf3dca 100644 --- a/2022/23xxx/CVE-2022-23106.json +++ b/2022/23xxx/CVE-2022-23106.json @@ -1,17 +1,73 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23106", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Configuration as Code Plugin", + "version": { + "version_data": [ + { + "version_value": "1.55", + "version_affected": "<=" + }, + { + "version_value": "1.47.1", + "version_affected": "!" + }, + { + "version_value": "1.53.1", + "version_affected": "!" + }, + { + "version_value": "1.54.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-208: Observable Timing Discrepancy" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23107.json b/2022/23xxx/CVE-2022-23107.json index 3d85e5d5bf9..4b0105f6d42 100644 --- a/2022/23xxx/CVE-2022-23107.json +++ b/2022/23xxx/CVE-2022-23107.json @@ -1,17 +1,73 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23107", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Warnings Next Generation Plugin", + "version": { + "version_data": [ + { + "version_value": "9.10.2", + "version_affected": "<=" + }, + { + "version_value": "9.0.2", + "version_affected": "!" + }, + { + "version_value": "9.5.2", + "version_affected": "!" + }, + { + "version_value": "9.7.1", + "version_affected": "!" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2090", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2090", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23108.json b/2022/23xxx/CVE-2022-23108.json index 19d67270df8..c9e02e9ad98 100644 --- a/2022/23xxx/CVE-2022-23108.json +++ b/2022/23xxx/CVE-2022-23108.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23108", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Badge Plugin", + "version": { + "version_data": [ + { + "version_value": "1.9", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23109.json b/2022/23xxx/CVE-2022-23109.json index 636fe0e564e..fdfb77ae254 100644 --- a/2022/23xxx/CVE-2022-23109.json +++ b/2022/23xxx/CVE-2022-23109.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23109", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins HashiCorp Vault Plugin", + "version": { + "version_data": [ + { + "version_value": "3.7.0", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-668: Exposure of Resource to Wrong Sphere" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2213", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2213", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23110.json b/2022/23xxx/CVE-2022-23110.json index 7edd7b9265b..8ec5d2235a4 100644 --- a/2022/23xxx/CVE-2022-23110.json +++ b/2022/23xxx/CVE-2022-23110.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23110", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Publish Over SSH Plugin", + "version": { + "version_data": [ + { + "version_value": "1.22", + "version_affected": "<=" + }, + { + "version_value": "1.22", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2287", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2287", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23111.json b/2022/23xxx/CVE-2022-23111.json index 1c8e507a1a7..9d80feebef7 100644 --- a/2022/23xxx/CVE-2022-23111.json +++ b/2022/23xxx/CVE-2022-23111.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23111", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Publish Over SSH Plugin", + "version": { + "version_data": [ + { + "version_value": "1.22", + "version_affected": "<=" + }, + { + "version_value": "1.22", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2290", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2290", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23112.json b/2022/23xxx/CVE-2022-23112.json index 1eb31e513fe..c2cc13edd79 100644 --- a/2022/23xxx/CVE-2022-23112.json +++ b/2022/23xxx/CVE-2022-23112.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23112", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Publish Over SSH Plugin", + "version": { + "version_data": [ + { + "version_value": "1.22", + "version_affected": "<=" + }, + { + "version_value": "1.22", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862: Missing Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2290", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2290", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23113.json b/2022/23xxx/CVE-2022-23113.json index 71ee0433783..a7c19ebcade 100644 --- a/2022/23xxx/CVE-2022-23113.json +++ b/2022/23xxx/CVE-2022-23113.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23113", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Publish Over SSH Plugin", + "version": { + "version_data": [ + { + "version_value": "1.22", + "version_affected": "<=" + }, + { + "version_value": "1.22", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2307", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2307", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23114.json b/2022/23xxx/CVE-2022-23114.json index 793917cfeb3..90356e1e770 100644 --- a/2022/23xxx/CVE-2022-23114.json +++ b/2022/23xxx/CVE-2022-23114.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23114", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Publish Over SSH Plugin", + "version": { + "version_data": [ + { + "version_value": "1.22", + "version_affected": "<=" + }, + { + "version_value": "1.22", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Publish Over SSH Plugin 1.22 and earlier stores password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-256: Plaintext Storage of a Password" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2291", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2291", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23115.json b/2022/23xxx/CVE-2022-23115.json index 8e58feecc4c..7d0d65ab73c 100644 --- a/2022/23xxx/CVE-2022-23115.json +++ b/2022/23xxx/CVE-2022-23115.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23115", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins batch task Plugin", + "version": { + "version_data": [ + { + "version_value": "1.19", + "version_affected": "<=" + }, + { + "version_value": "1.19", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-site request forgery (CSRF) vulnerabilities in Jenkins batch task Plugin 1.19 and earlier allows attackers with Overall/Read access to retrieve logs, build or delete a batch task." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1025", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1025", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23116.json b/2022/23xxx/CVE-2022-23116.json index e9ebc177d55..3f2afe114e9 100644 --- a/2022/23xxx/CVE-2022-23116.json +++ b/2022/23xxx/CVE-2022-23116.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23116", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Conjur Secrets Plugin", + "version": { + "version_data": [ + { + "version_value": "1.0.9", + "version_affected": "<=" + }, + { + "version_value": "1.0.9", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to decrypt secrets stored in Jenkins obtained through another method." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-693: Protection Mechanism Failure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20(1)", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20(1)", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23117.json b/2022/23xxx/CVE-2022-23117.json index 023ef48ec3f..151b7dc9cdc 100644 --- a/2022/23xxx/CVE-2022-23117.json +++ b/2022/23xxx/CVE-2022-23117.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23117", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Conjur Secrets Plugin", + "version": { + "version_data": [ + { + "version_value": "1.0.9", + "version_affected": "<=" + }, + { + "version_value": "1.0.9", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to retrieve all username/password credentials stored on the Jenkins controller." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-693: Protection Mechanism Failure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20(2)", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20(2)", + "refsource": "CONFIRM" } ] } diff --git a/2022/23xxx/CVE-2022-23118.json b/2022/23xxx/CVE-2022-23118.json index 5041dfe3104..4001c80ec6b 100644 --- a/2022/23xxx/CVE-2022-23118.json +++ b/2022/23xxx/CVE-2022-23118.json @@ -1,17 +1,65 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-23118", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "jenkinsci-cert@googlegroups.com" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Debian Package Builder Plugin", + "version": { + "version_data": [ + { + "version_value": "1.6.11", + "version_affected": "<=" + }, + { + "version_value": "1.6.11", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jenkins Debian Package Builder Plugin 1.6.11 and earlier implements functionality that allows agents to invoke command-line `git` at an attacker-specified path on the controller, allowing attackers able to control agent processes to invoke arbitrary OS commands on the controller." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-693: Protection Mechanism Failure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2546", + "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2546", + "refsource": "CONFIRM" } ] }