{ "schema_version": "1.4.0", "id": "GHSA-m82g-fv7v-h64m", "modified": "2022-12-12T22:08:48Z", "published": "2022-12-12T09:30:35Z", "aliases": [ "CVE-2022-46688" ], "summary": "Jenkins Sonar Gerrit Plugin vulnerable to Cross-Site Request Forgery", "details": "A cross-site request forgery (CSRF) vulnerability in Jenkins Sonar Gerrit Plugin 377.v8f3808963dc5 and earlier allows attackers to have Jenkins connect to Gerrit servers (previously configured by Jenkins administrators) using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins:sonar-gerrit" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "378.vf4646d4df087" } ] } ], "database_specific": { "last_known_affected_version_range": "<= 377.v8f3808963dc5" } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46688" }, { "type": "WEB", "url": "https://github.com/jenkinsci/sonar-gerrit-plugin/commit/f4646d4df0870bd06b76de86309bb38fbd929d54" }, { "type": "PACKAGE", "url": "https://github.com/jenkinsci/sonar-gerrit-plugin" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-1002" } ], "database_specific": { "cwe_ids": [ "CWE-352" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-12-12T22:08:48Z", "nvd_published_at": "2022-12-12T09:15:00Z" } }