{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T05:02:49.295","vulnerabilities":[{"cve":{"id":"CVE-2022-25196","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2022-02-15T17:15:10.537","lastModified":"2024-11-21T06:51:47.397","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in."},{"lang":"es","value":"Jenkins GitLab Authentication Plugin versiones 1.13 y anteriores, registra el encabezado HTTP Referer como parte de los parámetros de consulta de la URL cuando es iniciado el proceso de autenticación, lo que permite a atacantes con acceso a Jenkins diseñar una URL que redirija a usuarios a una URL especificada por el atacante después de iniciar la sesión"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:N","baseScore":4.9,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:gitlab_authentication:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1.13","matchCriteriaId":"14DEE4FC-5B60-4DC7-8BBB-76311E5E5498"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2022/02/15/2","source":"jenkinsci-cert@googlegroups.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833","source":"jenkinsci-cert@googlegroups.com","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2022/02/15/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Vendor Advisory"]}]}}]}