First published: Wed Jul 27 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins External Monitor Job Type Plugin 191.v363d0d1efdf8 and earlier allows attackers to create runs of an external job.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins External Monitor Job Type | <=191.v363d0d1efdf8 | |
maven/org.jenkins-ci.plugins:external-monitor-job | <=191.v363d0d1efdf8 | 192.ve979ca_8b_3ccd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36886 has a moderate severity level due to the potential for unauthorized job execution.
To fix CVE-2022-36886, upgrade the Jenkins External Monitor Job Type Plugin to version 192.ve979ca_8b_3ccd or later.
CVE-2022-36886 is caused by a cross-site request forgery (CSRF) vulnerability that allows attackers to trigger external job runs.
Versions of Jenkins External Monitor Job Type Plugin up to and including 191.v363d0d1efdf8 are affected by CVE-2022-36886.
Yes, CVE-2022-36886 can be exploited remotely by an attacker to execute unauthorized actions.