Vulnerability Details CVE-2022-30946
A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 13.1%
CVSS Severity
CVSS v3 Score 4.3
CVSS v2 Score 4.3
Products affected by CVE-2022-30946
-
cpe:2.3:a:jenkins:script_security:1.0
-
cpe:2.3:a:jenkins:script_security:1.1
-
cpe:2.3:a:jenkins:script_security:1.10
-
cpe:2.3:a:jenkins:script_security:1.11
-
cpe:2.3:a:jenkins:script_security:1.12
-
cpe:2.3:a:jenkins:script_security:1.13
-
cpe:2.3:a:jenkins:script_security:1.14
-
cpe:2.3:a:jenkins:script_security:1.15
-
cpe:2.3:a:jenkins:script_security:1.16
-
cpe:2.3:a:jenkins:script_security:1.17
-
cpe:2.3:a:jenkins:script_security:1.18
-
cpe:2.3:a:jenkins:script_security:1.18.1
-
cpe:2.3:a:jenkins:script_security:1.19
-
cpe:2.3:a:jenkins:script_security:1.2
-
cpe:2.3:a:jenkins:script_security:1.20
-
cpe:2.3:a:jenkins:script_security:1.21
-
cpe:2.3:a:jenkins:script_security:1.22
-
cpe:2.3:a:jenkins:script_security:1.23
-
cpe:2.3:a:jenkins:script_security:1.24
-
cpe:2.3:a:jenkins:script_security:1.25
-
cpe:2.3:a:jenkins:script_security:1.26
-
cpe:2.3:a:jenkins:script_security:1.27
-
cpe:2.3:a:jenkins:script_security:1.28
-
cpe:2.3:a:jenkins:script_security:1.29
-
cpe:2.3:a:jenkins:script_security:1.29.1
-
cpe:2.3:a:jenkins:script_security:1.3
-
cpe:2.3:a:jenkins:script_security:1.30
-
cpe:2.3:a:jenkins:script_security:1.31
-
cpe:2.3:a:jenkins:script_security:1.32
-
cpe:2.3:a:jenkins:script_security:1.33
-
cpe:2.3:a:jenkins:script_security:1.34
-
cpe:2.3:a:jenkins:script_security:1.35
-
cpe:2.3:a:jenkins:script_security:1.36
-
cpe:2.3:a:jenkins:script_security:1.37
-
cpe:2.3:a:jenkins:script_security:1.38
-
cpe:2.3:a:jenkins:script_security:1.39
-
cpe:2.3:a:jenkins:script_security:1.4
-
cpe:2.3:a:jenkins:script_security:1.40
-
cpe:2.3:a:jenkins:script_security:1.41
-
cpe:2.3:a:jenkins:script_security:1.42
-
cpe:2.3:a:jenkins:script_security:1.43
-
cpe:2.3:a:jenkins:script_security:1.44
-
cpe:2.3:a:jenkins:script_security:1.44.1
-
cpe:2.3:a:jenkins:script_security:1.45
-
cpe:2.3:a:jenkins:script_security:1.46
-
cpe:2.3:a:jenkins:script_security:1.46.1
-
cpe:2.3:a:jenkins:script_security:1.47
-
cpe:2.3:a:jenkins:script_security:1.48
-
cpe:2.3:a:jenkins:script_security:1.49
-
cpe:2.3:a:jenkins:script_security:1.5
-
cpe:2.3:a:jenkins:script_security:1.50
-
cpe:2.3:a:jenkins:script_security:1.51
-
cpe:2.3:a:jenkins:script_security:1.52
-
cpe:2.3:a:jenkins:script_security:1.53
-
cpe:2.3:a:jenkins:script_security:1.54
-
cpe:2.3:a:jenkins:script_security:1.54.1
-
cpe:2.3:a:jenkins:script_security:1.54.2
-
cpe:2.3:a:jenkins:script_security:1.54.3
-
cpe:2.3:a:jenkins:script_security:1.54.4
-
cpe:2.3:a:jenkins:script_security:1.55
-
cpe:2.3:a:jenkins:script_security:1.56
-
cpe:2.3:a:jenkins:script_security:1.57
-
cpe:2.3:a:jenkins:script_security:1.57.1
-
cpe:2.3:a:jenkins:script_security:1.57.2
-
cpe:2.3:a:jenkins:script_security:1.57.3
-
cpe:2.3:a:jenkins:script_security:1.57.4
-
cpe:2.3:a:jenkins:script_security:1.57.5
-
cpe:2.3:a:jenkins:script_security:1.57.6
-
cpe:2.3:a:jenkins:script_security:1.58
-
cpe:2.3:a:jenkins:script_security:1.59
-
cpe:2.3:a:jenkins:script_security:1.6
-
cpe:2.3:a:jenkins:script_security:1.60
-
cpe:2.3:a:jenkins:script_security:1.60.1
-
cpe:2.3:a:jenkins:script_security:1.61
-
cpe:2.3:a:jenkins:script_security:1.62
-
cpe:2.3:a:jenkins:script_security:1.63
-
cpe:2.3:a:jenkins:script_security:1.63.1
-
cpe:2.3:a:jenkins:script_security:1.64
-
cpe:2.3:a:jenkins:script_security:1.65
-
cpe:2.3:a:jenkins:script_security:1.66
-
cpe:2.3:a:jenkins:script_security:1.66.1
-
cpe:2.3:a:jenkins:script_security:1.66.2
-
cpe:2.3:a:jenkins:script_security:1.66.3
-
cpe:2.3:a:jenkins:script_security:1.66.4
-
cpe:2.3:a:jenkins:script_security:1.66.5
-
cpe:2.3:a:jenkins:script_security:1.67
-
cpe:2.3:a:jenkins:script_security:1.68
-
cpe:2.3:a:jenkins:script_security:1.69
-
cpe:2.3:a:jenkins:script_security:1.7
-
cpe:2.3:a:jenkins:script_security:1.70
-
cpe:2.3:a:jenkins:script_security:1.71
-
cpe:2.3:a:jenkins:script_security:1.72
-
cpe:2.3:a:jenkins:script_security:1.73
-
cpe:2.3:a:jenkins:script_security:1.74
-
cpe:2.3:a:jenkins:script_security:1.75
-
cpe:2.3:a:jenkins:script_security:1.76
-
cpe:2.3:a:jenkins:script_security:1.77
-
cpe:2.3:a:jenkins:script_security:1.78
-
cpe:2.3:a:jenkins:script_security:1.78.1
-
cpe:2.3:a:jenkins:script_security:1.8
-
cpe:2.3:a:jenkins:script_security:1.9
-
cpe:2.3:a:jenkins:script_security:1118.vba21ca2e3286
-
cpe:2.3:a:jenkins:script_security:1125.v132f99385e1b_
-
cpe:2.3:a:jenkins:script_security:1131.v8b_b_5eda_c328e
-
cpe:2.3:a:jenkins:script_security:1138.v8e727069a_025
-
cpe:2.3:a:jenkins:script_security:1140.vf967fb_efa_55a_
-
cpe:2.3:a:jenkins:script_security:1145.1148.vf6d17a_a_a_eef6
-
cpe:2.3:a:jenkins:script_security:1145.vb_cf6cf6ed960
-
cpe:2.3:a:jenkins:script_security:1146.vdf547f19a_473
-
cpe:2.3:a:jenkins:script_security:1158.v7c1b_73a_69a_08