CVE-2022-25196
Summary
| CVE | CVE-2022-25196 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-15 17:15:00 UTC |
| Updated | 2023-11-03 16:24:00 UTC |
| Description | Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Jenkins Security Advisory 2022-02-15 |
CONFIRM |
www.jenkins.io |
Issue Tracking, Patch, Vendor Advisory |
| oss-security - Multiple vulnerabilities in Jenkins plugins |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 376435 Jenkins Plugins Multiple Security Vulnerabilities (Jenkins Security Advisory 2022-02-15)