First published: Tue Feb 15 2022(Updated: )
Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP `Referer` header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in. This issue is caused by an incomplete fix of [SECURITY-796](https://www.jenkins.io/security/advisory/2019-08-07/#SECURITY-796).
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:gitlab-oauth | <=1.13 | |
Jenkins GitLab Authentication Plugin | <=1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25196 is categorized with a medium severity level due to its potential for exploitation post-authentication.
To fix CVE-2022-25196, upgrade the Jenkins GitLab Authentication Plugin to version 1.14 or later.
The impact of CVE-2022-25196 allows attackers to redirect authenticated users to malicious URLs, potentially leading to phishing attacks.
Versions of the Jenkins GitLab Authentication Plugin up to and including 1.13 are affected by CVE-2022-25196.
Exploitation of CVE-2022-25196 may result in users being redirected to unintended sites after logging into Jenkins.