A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b73a69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver.
[
{
"deprecated": false,
"target": {
"file": "src/main/java/org/jenkinsci/plugins/scriptsecurity/scripts/ScriptApproval.java",
"function": "checking"
},
"signature_version": "v1",
"source": "https://github.com/jenkinsci/script-security-plugin/commit/35f6a0b8207ed3a32a85f27c1312da6cd738eeaa",
"digest": {
"function_hash": "243053922828200876436764045460028826147",
"length": 604.0
},
"signature_type": "Function",
"id": "CVE-2022-30946-70a50d2d"
},
{
"deprecated": false,
"target": {
"file": "src/main/java/org/jenkinsci/plugins/scriptsecurity/scripts/ScriptApproval.java"
},
"signature_version": "v1",
"source": "https://github.com/jenkinsci/script-security-plugin/commit/35f6a0b8207ed3a32a85f27c1312da6cd738eeaa",
"digest": {
"threshold": 0.9,
"line_hashes": [
"247190495179758266572481066570786804673",
"167999783080315131500261662791942509463",
"121267700977726733791167484452692597670",
"39917716663608181141736465198567593231",
"289597266990881468480631836825524301844",
"236055391751122233183289647518514099902",
"150825002549546166225446775241610946125",
"500911795054415170633374521061405029",
"280819062623828007514179088577183876334",
"84070120999375605160030220347455786089",
"223137633455318029423863477277013203959",
"250733090564975443232259021468433703349",
"269250703096076647657600985504105281709",
"198601851934786616786394872181445693666",
"238475456578126862093474237346476679751",
"214242453646278936544984494447735434029",
"300657914692014166977767370373596327484",
"339215527704213608801660788207473458661",
"8964003737450922026086742804177696289",
"282243120677463312286873005183975868761",
"64865270473693994228611861625137348886",
"312354628292864390096562044962419924767"
]
},
"signature_type": "Line",
"id": "CVE-2022-30946-efe5679d"
}
]