Language:
Severity: Critical
ID: 165766
File Name: jenkins_2_370.nasl
Version: 1.4
Type: combined
Agent: windows, macosx, unix
Family: CGI abuses
Published: 10/7/2022
Updated: 6/4/2024
Configuration: Enable thorough checks
Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Enable CGI Scanning: true
Risk Factor: Medium
Score: 5.9
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-41253
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2022-41238
CPE: cpe:/a:jenkins:jenkins, cpe:/a:cloudbees:jenkins
Required KB Items: installed_sw/Jenkins
Exploit Ease: No known exploits are available
Patch Publication Date: 9/21/2022
Vulnerability Publication Date: 9/21/2022
CVE: CVE-2022-41224, CVE-2022-41225, CVE-2022-41226, CVE-2022-41227, CVE-2022-41228, CVE-2022-41229, CVE-2022-41230, CVE-2022-41231, CVE-2022-41232, CVE-2022-41233, CVE-2022-41234, CVE-2022-41235, CVE-2022-41236, CVE-2022-41237, CVE-2022-41238, CVE-2022-41239, CVE-2022-41240, CVE-2022-41241, CVE-2022-41242, CVE-2022-41243, CVE-2022-41244, CVE-2022-41245, CVE-2022-41246, CVE-2022-41247, CVE-2022-41248, CVE-2022-41249, CVE-2022-41250, CVE-2022-41251, CVE-2022-41252, CVE-2022-41253, CVE-2022-41254, CVE-2022-41255