First published: Wed Jan 12 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:mailer | <1.34.2 | 1.34.2 |
maven/org.jenkins-ci.plugins:mailer | >=391.ve4a38c1bcf4b<408.vd726a | 408.vd726a |
Jenkins Mailer Jenkins | <1.34.2 | |
Jenkins Mailer | =391.ve4a_38c1b_cf4b_ | |
oracle communications Cloud native core automated test suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20613 is a cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin.
CVE-2022-20613 allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
The severity of CVE-2022-20613 is medium with a CVSS score of 4.3.
To fix CVE-2022-20613, you should update Jenkins Mailer Plugin to version 408.vd726a or later.
You can find more information about CVE-2022-20613 at the following references: [1], [2], [3].