First published: Wed Jan 12 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Bitbucket Branch Source | <=2.9.10 | |
Jenkins Bitbucket Branch Source | =737.vdf9dc06105be | |
maven/org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source | <2.9.7.2 | 2.9.7.2 |
maven/org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source | >=2.9.8<2.9.11.2 | 2.9.11.2 |
maven/org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source | >=720.vbe985dd73d66<725.vd9f8be0fa250 | 725.vd9f8be0fa250 |
maven/org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source | >=726.v7e6f53de133c<746.v350d2781c184 | 746.v350d2781c184 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-20619 is rated as high with a CVSS score of 7.1.
To mitigate the CSRF vulnerability in Jenkins Bitbucket Branch Source Plugin for CVE-2022-20619, update to version 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, or 2.9.7.2 or later that require POST requests for an HTTP endpoint.