First published: Wed Dec 07 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Sonar Gerrit Plugin 377.v8f3808963dc5 and earlier allows attackers to have Jenkins connect to Gerrit servers (previously configured by Jenkins administrators) using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:sonar-gerrit | <=377.v8f3808963dc5 | 378.vf4646d4df087 |
Jenkins | <=377.v8f3808963dc5 | |
<=377.v8f3808963dc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46688 is classified as a high severity cross-site request forgery (CSRF) vulnerability.
To fix CVE-2022-46688, upgrade the Jenkins Sonar Gerrit Plugin to version 378.vf4646d4df087 or later.
CVE-2022-46688 allows attackers to control connections to Gerrit servers using unauthorized credentials, compromising the integrity of Jenkins.
All users of Jenkins Sonar Gerrit Plugin versions up to 377.v8f3808963dc5 are affected by CVE-2022-46688.
Currently, there is no documented workaround for CVE-2022-46688, so upgrading the plugin is the recommended action.