Skip to content

[🐸 Frogbot] Update version of org.jenkins-ci.plugins:git to 4.2.1#886

Open
github-actions[bot] wants to merge 1 commit intomasterfrom
frogbot-org.jenkins-ci.plugins_git-9040c970b91cc243948c1c9cc2a5e411
Open

[🐸 Frogbot] Update version of org.jenkins-ci.plugins:git to 4.2.1#886
github-actions[bot] wants to merge 1 commit intomasterfrom
frogbot-org.jenkins-ci.plugins_git-9040c970b91cc243948c1c9cc2a5e411

Conversation

@github-actions
Copy link
Copy Markdown

@github-actions github-actions bot commented Sep 5, 2023

📦 Vulnerable Dependencies

✍️ Summary

SEVERITY CONTEXTUAL ANALYSIS DIRECT DEPENDENCIES IMPACTED DEPENDENCY FIXED VERSIONS

High
Undetermined org.jenkins-ci.plugins:git:3.3.2 org.jenkins-ci.plugins:git:3.3.2 [4.2.1]

👇 Details

  • Severity 🔥 High
  • Contextual Analysis: Undetermined
  • Package Name: org.jenkins-ci.plugins:git
  • Current Version: 3.3.2
  • Fixed Version: [4.2.1]
  • CVE: CVE-2022-36883

Description:

A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant