Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/13762?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13762?format=api", "vulnerability_id": "VCID-k6wy-rwhv-ckd2", "summary": "Incorrect Authorization\nJenkins Pipeline: Shared Groovy Libraries Plugin 564.ve62a_4eb_b_e039 and earlier, except 2.21.3, allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the definition of a dynamically retrieved library in their pull request, even if the Pipeline is configured to not trust them.", "aliases": [ { "alias": "CVE-2022-29047" }, { "alias": "GHSA-hh6f-6fp5-gfpv" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/49478?format=api", "purl": "pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib@2.21.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib@2.21.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/49479?format=api", "purl": "pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib@566.vd0a", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib@566.vd0a" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/49472?format=api", "purl": "pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib@544.vff04fa68714d", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a8d9-5365-qubn" }, { "vulnerability": "VCID-k6wy-rwhv-ckd2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib@544.vff04fa68714d" }, { "url": "http://public2.vulnerablecode.io/api/packages/49474?format=api", "purl": "pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib@564.ve62a", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k6wy-rwhv-ckd2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib@564.ve62a" }, { "url": "http://public2.vulnerablecode.io/api/packages/99113?format=api", "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1652967082-1?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ftm-axhf-gbbd" }, { "vulnerability": "VCID-2jak-uh1e-zbfx" }, { "vulnerability": "VCID-k6wy-rwhv-ckd2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.7.1652967082-1%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/98056?format=api", "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.8.1672842762-1?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4qvq-xv22-xbed" }, { "vulnerability": "VCID-7ez2-n617-u3dq" }, { "vulnerability": "VCID-9h4k-xjx5-afc8" }, { "vulnerability": "VCID-c2jh-gx5w-mqcd" }, { "vulnerability": "VCID-ca7m-fb38-kfe2" }, { "vulnerability": "VCID-fzvq-dpvh-v7eu" }, { "vulnerability": "VCID-gxu6-51zm-sfh7" }, { "vulnerability": "VCID-hg91-mnh3-g3a4" }, { "vulnerability": "VCID-k6wy-rwhv-ckd2" }, { "vulnerability": "VCID-qsut-4d83-97h1" }, { "vulnerability": "VCID-rs56-6qvx-vucg" }, { "vulnerability": "VCID-tt48-pfzv-mkgt" }, { "vulnerability": "VCID-ubq1-gzr6-x3fu" }, { "vulnerability": "VCID-xq5k-dyk9-u3ct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.8.1672842762-1%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/99114?format=api", "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1651754460-1?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ftm-axhf-gbbd" }, { "vulnerability": "VCID-2jak-uh1e-zbfx" }, { "vulnerability": "VCID-k6wy-rwhv-ckd2" }, { "vulnerability": "VCID-u4r3-mm95-nbe3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.9.1651754460-1%3Farch=el8" }, { "url": "http://public2.vulnerablecode.io/api/packages/97533?format=api", "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1675702407-1?arch=el8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1pzb-gkrf-m3hq" }, { "vulnerability": "VCID-1tha-u7dt-tfc9" }, { "vulnerability": "VCID-2zhb-qfhq-xkdp" }, { "vulnerability": "VCID-73th-g3mx-dqf1" }, { "vulnerability": "VCID-9h46-72hw-bkcr" }, { "vulnerability": "VCID-atqg-nfz6-zyfs" }, { "vulnerability": "VCID-k6wy-rwhv-ckd2" }, { "vulnerability": "VCID-n5vc-ggjg-kfc1" }, { "vulnerability": "VCID-netd-rr9e-wbg5" }, { "vulnerability": "VCID-pnge-tumu-v7e2" }, { "vulnerability": "VCID-rs56-6qvx-vucg" }, { "vulnerability": "VCID-rxtr-936k-h3cc" }, { "vulnerability": "VCID-s839-rpta-6bej" }, { "vulnerability": "VCID-tx8n-nmhx-gqg1" }, { "vulnerability": "VCID-v2pq-1qhm-4qb9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.12.1675702407-1%3Farch=el8" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29047.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29047.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29047", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.2001", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20192", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20247", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19972", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20129", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20024", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20006", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29047" }, { "reference_url": "https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/97bf32458e60ad252cfe5e7949bacf04459cee64", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/97bf32458e60ad252cfe5e7949bacf04459cee64" }, { "reference_url": "https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/bae59b46cb524549d7f346ba73d3161804c97331", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/bae59b46cb524549d7f346ba73d3161804c97331" }, { "reference_url": "https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-1951", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-03T19:16:45Z/" } ], "url": "https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-1951" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074855", "reference_id": "2074855", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074855" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29047", "reference_id": "CVE-2022-29047", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29047" }, { "reference_url": "https://github.com/advisories/GHSA-hh6f-6fp5-gfpv", "reference_id": "GHSA-hh6f-6fp5-gfpv", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-hh6f-6fp5-gfpv" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2205", "reference_id": "RHSA-2022:2205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4909", "reference_id": "RHSA-2022:4909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017", "reference_id": "RHSA-2023:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064", "reference_id": "RHSA-2023:1064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1064" } ], "weaknesses": [ { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 863, "name": "Incorrect Authorization", "description": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 288, "name": "Authentication Bypass Using an Alternate Path or Channel", "description": "A product requires authentication, but the product has an alternate path or channel that does not require authentication." } ], "exploits": [], "severity_range_score": "7.0 - 8.9", "exploitability": "0.5", "weighted_severity": "8.0", "risk_score": 4.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6wy-rwhv-ckd2" }