This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Jenkins First view 2017-10-04
Product Git Last view 2022-08-23
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:jenkins:git:3.0.3:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.4.3:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.4.4:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.5.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.6.2:beta-2:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.6.4:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.1.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.3.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.7.3:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.8.1:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.2:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:3.0.4:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.9.1:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:3.0.2:beta-2:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.5.3:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.5.2:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.5.1:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.5.0:beta-5:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.3.3:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.3.2:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.3.1:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.3.0:beta-4:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.3.0:beta-3:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.2.3:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.2.11:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.9.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.9.2:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.0.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:3.0.5:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.5.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.6.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.7.0:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:0.7.1:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.3:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.4:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.5:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.6:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.20:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.21:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.22:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:1.1.23:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.0.0:alpha-1:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.0.0:alpha-2:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.0.0:beta-2:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.0.0:beta-3:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.2.8:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.2.9:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.2.10:*:*:*:*:jenkins:*:* 11
cpe:2.3:a:jenkins:git:2.4.2:*:*:*:*:jenkins:*:* 11

Related : CVE

  Date Alert Description
6.5 2022-08-23 CVE-2022-38663

Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding.

5.3 2022-07-27 CVE-2022-36884

The webhook endpoint in Jenkins Git Plugin 4.11.3 and earlier provide unauthenticated attackers information about the existence of jobs configured to use an attacker-specified Git repository.

7.5 2022-07-27 CVE-2022-36883

A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

8.8 2022-07-27 CVE-2022-36882

A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 4.11.3 and earlier allows attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

7.5 2022-05-17 CVE-2022-30947

Jenkins Git Plugin 4.11.1 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

6.1 2021-10-06 CVE-2021-21684

Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.

5.4 2020-03-09 CVE-2020-2136

Jenkins Git Plugin 4.2.0 and earlier does not escape the error message for the repository URL for Microsoft TFS field form validation, resulting in a stored cross-site scripting vulnerability.

4.3 2019-02-06 CVE-2019-1003010

A cross-site request forgery vulnerability exists in Jenkins Git Plugin 3.9.1 and earlier in src/main/java/hudson/plugins/git/GitTagAction.java that allows attackers to create a Git tag in a workspace and attach corresponding metadata to a build record.

6.4 2018-06-05 CVE-2018-1000182

A server-side request forgery vulnerability exists in Jenkins Git Plugin 3.9.0 and older in AssemblaWeb.java, GitBlitRepositoryBrowser.java, Gitiles.java, TFS2013GitRepositoryBrowser.java, ViewGitWeb.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

5.3 2018-03-13 CVE-2018-1000110

An improper authorization vulnerability exists in Jenkins Git Plugin version 3.7.0 and earlier in GitStatus.java that allows an attacker with network access to obtain a list of nodes and users.

7.5 2017-10-04 CVE-2017-1000092

Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.

CWE : Common Weakness Enumeration

%idName
42% (3) CWE-352 Cross-Site Request Forgery (CSRF)
14% (1) CWE-522 Insufficiently Protected Credentials
14% (1) CWE-306 Missing Authentication for Critical Function
14% (1) CWE-116 Improper Encoding or Escaping of Output
14% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')