Cross-site request forgery in Git - CVE-2017-1000092

 

Cross-site request forgery in Git - CVE-2017-1000092

Published: October 5, 2017 / Updated: August 8, 2020


Vulnerability identifier: #VU38143
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-1000092
CWE-ID: CWE-352
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Git
Affected software:
Git

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.


How to mitigate CVE-2017-1000092

Install update from vendor's website.

Sources