Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Filtered by product Git
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-30947 1 Jenkins 1 Git 2024-01-09 5.0 MEDIUM 7.5 HIGH
Jenkins Git Plugin 4.11.1 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
CVE-2022-36883 1 Jenkins 1 Git 2023-11-22 N/A 7.5 HIGH
A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
CVE-2022-36882 1 Jenkins 1 Git 2023-11-22 N/A 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 4.11.3 and earlier allows attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
CVE-2022-30948 1 Jenkins 3 Git, Mercurial, Repo 2022-05-26 5.0 MEDIUM 7.5 HIGH
Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
CVE-2017-1000092 1 Jenkins 1 Git 2017-10-17 2.6 LOW 7.5 HIGH
Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.